Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta-heuristic approach

被引:0
|
作者
Aliar, Ahamed Ali Samsu [1 ]
Gowri, V. [2 ]
Abins, A. Arockia [1 ]
机构
[1] Easwari Engn Coll, Dept Comp Sci & Engn, Chennai, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Ramapuram, India
关键词
DDOS ATTACKS; OPTIMIZATION ALGORITHM; FRAMEWORK; MACHINE; SDN;
D O I
10.1002/ett.4921
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The biggest firms throughout the world now are the ones that offer services in the cloud. One of the top problems for cloud users (CUs) and cloud service providers (CSPs) is the availability of cloud-based services whenever needed. A distributed denial of service (DDoS) assault has been a significant threat to the security of the system in recent years. DDoS defense and detection of these attacks have become hot topics of research for academia and business. However, most approaches cannot accomplish efficient detection outcomes with few false alarms. As a result, minimizing the consequences of DDoS attacks allows CSPs to offer CUs high-quality services. In the cloud sector, a collective deep structured algorithm is suggested to identify DDoS attacks successfully. The recommended method contains several stages: data acquisition, pre-processing, optimal feature detection, and selection. The first step is the acquisition of data using the help of publicly available sources. Further, the input data undergoes preprocessing. Consequently, the optimal weighted feature selection takes place on the preprocessed data, where the optimization is done with the aid of the Hybrid Border Collie and Dragonfly Algorithm (HBCDA). Finally, DDoS attack detection is achieved via a novel method known as adaptive deep dilated ensemble (ADDE), which includes, one-dimensional convolutional neural network (1DCNN), deep temporal convolutional neural network (DTCNN), recurrent neural network (RNN), and bidirectional long short-term memory (Bi-LSTM). For the attainment of optimal results, the parameter tuning is accomplished by using the HBCDA approach. The detection outcome is computed by using the fuzzy ranking mechanism. The validation is done for the suggested method model, and its corresponding findings are validated with conventional techniques. Hence, the suggested approach outperforms the detection performance and ensures more efficiency than traditional approaches.
引用
收藏
页数:34
相关论文
共 50 条
  • [41] Meta-heuristic Searched-Ensemble Learning for fake news detection with optimal weighted feature selection approach
    Nithya, S. Hannah
    Sahayadhas, Arun
    DATA & KNOWLEDGE ENGINEERING, 2023, 144
  • [42] A meta-heuristic approach for supporting adaptive disassembly sequencing using a multi-objective concept
    Shimizu, Y.
    Yamada, Y.
    INTERNATIONAL JOURNAL OF SUSTAINABLE ENGINEERING, 2008, 1 (03) : 202 - 213
  • [43] Detection of Distributed Denial of Service (DD oS) Attacks Using Computational Intelligence and Majority Vote-Based Ensemble Approach
    Mishra, Anupama
    Joshi, Bineet Kumar
    Arya, Varsha
    Gupta, Avadhesh Kumar
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [44] A Novel Approach to statistical comparison of meta-heuristic stochastic optimization algorithms using deep statistics
    Eftimov, Tome
    Korosec, Peter
    Seljak, Barbara Korousic
    INFORMATION SCIENCES, 2017, 417 : 186 - 215
  • [45] An energy-aware service placement strategy using hybrid meta-heuristic algorithm in iot environments
    Hu, Yuanchao
    Huang, Tao
    Yu, Yang
    An, Yunzhu
    Cheng, Meng
    Zhou, Wen
    Xian, Wentao
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (05): : 2913 - 2919
  • [46] An energy efficient service composition mechanism using a hybrid meta-heuristic algorithm in a mobile cloud environment
    Ibrahim, Godar J.
    Rashid, Tarik A.
    Akinsolu, Mobayode O.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 143 : 77 - 87
  • [47] Solving a Cubic Cell Formation Problem with Quality Index Using a Hybrid Meta-Heuristic Approach
    Urazel, Burak
    Sahin, Yeliz Buruk
    GAZI UNIVERSITY JOURNAL OF SCIENCE, 2023, 36 (02): : 752 - 771
  • [48] An energy-aware service placement strategy using hybrid meta-heuristic algorithm in iot environments
    Yuanchao HU
    Tao HUANG
    Yang YU
    Yunzhu AN
    Meng CHENG
    Wen ZHOU
    Wentao XIAN
    Cluster Computing, 2023, 26 : 2913 - 2919
  • [49] Detection of Denial-of-Service Attack Using Weight based Trust Aware Routing Approach
    Dani, Virendra
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (03): : 89 - 97
  • [50] Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks
    Latif, Rabia
    Abbas, Haider
    Latif, Seemab
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2016, 23 (1-2) : 24 - 35