Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta-heuristic approach

被引:0
|
作者
Aliar, Ahamed Ali Samsu [1 ]
Gowri, V. [2 ]
Abins, A. Arockia [1 ]
机构
[1] Easwari Engn Coll, Dept Comp Sci & Engn, Chennai, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Ramapuram, India
关键词
DDOS ATTACKS; OPTIMIZATION ALGORITHM; FRAMEWORK; MACHINE; SDN;
D O I
10.1002/ett.4921
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The biggest firms throughout the world now are the ones that offer services in the cloud. One of the top problems for cloud users (CUs) and cloud service providers (CSPs) is the availability of cloud-based services whenever needed. A distributed denial of service (DDoS) assault has been a significant threat to the security of the system in recent years. DDoS defense and detection of these attacks have become hot topics of research for academia and business. However, most approaches cannot accomplish efficient detection outcomes with few false alarms. As a result, minimizing the consequences of DDoS attacks allows CSPs to offer CUs high-quality services. In the cloud sector, a collective deep structured algorithm is suggested to identify DDoS attacks successfully. The recommended method contains several stages: data acquisition, pre-processing, optimal feature detection, and selection. The first step is the acquisition of data using the help of publicly available sources. Further, the input data undergoes preprocessing. Consequently, the optimal weighted feature selection takes place on the preprocessed data, where the optimization is done with the aid of the Hybrid Border Collie and Dragonfly Algorithm (HBCDA). Finally, DDoS attack detection is achieved via a novel method known as adaptive deep dilated ensemble (ADDE), which includes, one-dimensional convolutional neural network (1DCNN), deep temporal convolutional neural network (DTCNN), recurrent neural network (RNN), and bidirectional long short-term memory (Bi-LSTM). For the attainment of optimal results, the parameter tuning is accomplished by using the HBCDA approach. The detection outcome is computed by using the fuzzy ranking mechanism. The validation is done for the suggested method model, and its corresponding findings are validated with conventional techniques. Hence, the suggested approach outperforms the detection performance and ensures more efficiency than traditional approaches.
引用
收藏
页数:34
相关论文
共 50 条
  • [31] IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS
    Shurman, Mohammad M.
    Khrais, Rami M.
    Yateem, Abdulrahman A.
    2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2019, : 252 - 254
  • [32] A novel adaptive artifacts wavelet Denoising for EEG artifacts removal using deep learning with Meta-heuristic approach
    A Narmada
    M. K. Shukla
    Multimedia Tools and Applications, 2023, 82 : 40403 - 40441
  • [33] A novel adaptive artifacts wavelet Denoising for EEG artifacts removal using deep learning with Meta-heuristic approach
    Narmada, A.
    Shukla, M. K.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (26) : 40403 - 40441
  • [34] Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0
    Ferrag, Mohamed Amine
    Shu, Lei
    Djallel, Hamouda
    Choo, Kim-Kwang Raymond
    ELECTRONICS, 2021, 10 (11)
  • [35] MLDDoS: a distributed denial of service attack detection method using multi-level sketchMLDDoS: a distributed denial of service attack detection method using ...J. Xiao et al.
    Junbi Xiao
    Ruifeng Sun
    Jianhang Liu
    The Journal of Supercomputing, 81 (2)
  • [36] An optimized clustering using hybrid meta-heuristic approach for wireless sensor networks
    Rajaram, V
    Kumaratharan, N.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (18)
  • [37] Deep learning based concrete compressive strength prediction model with hybrid meta-heuristic approach
    Joshi, Deepa A.
    Menon, Radhika
    Jain, R. K.
    Kulkarni, A. V.
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 233
  • [38] Thyroid Detection and Classification Using DNN Based on Hybrid Meta-Heuristic and LSTM Technique
    Mohan, E.
    Saravanan, P.
    Natarajan, Balaji
    Kumer, S. V. Aswin
    Sambasivam, G.
    Kanna, G. Prabu
    Tyagi, Vaibhav Bhushan
    IEEE ACCESS, 2023, 11 : 68127 - 68138
  • [39] Retraction Note to: Detection of distributed denial of service using deep learning neural network
    S. Sumathi
    N. Karthikeyan
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 287 - 287
  • [40] RETRACTED ARTICLE: Detection of distributed denial of service using deep learning neural network
    S. Sumathi
    N. Karthikeyan
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 5943 - 5953