A New IDS for Detecting DDoS Attacks in Wireless Networks using Spotted Hyena Optimization and Fuzzy Temporal CNN

被引:2
|
作者
Nalayini, C. M. [1 ]
Katiravan, Jeevaa [1 ]
机构
[1] Velammal Engn Coll, Dept Informat Technol, Chennai, India
来源
JOURNAL OF INTERNET TECHNOLOGY | 2023年 / 24卷 / 01期
关键词
Fuzzy Decision Tree; Feature selection; CNN; FT-CNN; LSTM; INTRUSION DETECTION; DEFENSE; FRAMEWORK; ALGORITHM; SYSTEM;
D O I
10.53106/160792642023012401003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks are rapidly increasing in the internet era due to the growth of information technology. The distributed denial of service (DDoS) attacks are increasing dramatically due to the distributed services in cloud networks. In this paper, a new Intrusion Detection System (IDS) is proposed to improve the performance of the networks by detecting DDoS attacks effectively in wireless networks. In this work, Feature Selection and Spotted Hyena Optimization Based Feature Optimization Method (SFSH-FOM) to select the terms of accuracy and false alarm rate.
引用
收藏
页码:23 / 34
页数:12
相关论文
共 50 条
  • [1] Fuzzy-Logic Based IDS for Detecting Jamming Attacks in Wireless Mesh IoT Networks
    Savva, Michael
    Ioannou, Iacovos
    Vassiliou, Vasos
    2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET), 2022,
  • [2] Fuzzy-Logic Based IDS for Detecting Jamming Attacks in Wireless Mesh IoT Networks
    Savva, Michael
    Ioannou, Iacovos I.I.
    Vassiliou, Vasos
    arXiv, 2022,
  • [3] Detecting Signal Spoofing and Jamming Attacks in UAV Networks using a Lightweight IDS
    Arthur, Menaka Pushpa
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 276 - 280
  • [4] Detecting DDoS attacks in cloud computing using ANN and black hole optimization
    Kushwah, Gopal Singh
    Ali, Syed Taqi
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 355 - 359
  • [5] Detecting DDoS Attacks in IoT-Based Networks Using Matrix Profile
    Alzahrani, Mohammed Ali
    Alzahrani, Ali M.
    Siddiqui, Muhammad Shoaib
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [6] Detecting wormhole attacks in wireless networks using connectivity information
    Maheshwari, Ritesh
    Gao, Jie
    Das, Samir R.
    INFOCOM 2007, VOLS 1-5, 2007, : 107 - +
  • [7] Detecting flooding DDoS attacks in software defined networks using supervised learning techniques
    Wang, Song
    Balarezo, Juan Fernando
    Chavez, Karina Gomez
    Al-Hourani, Akram
    Kandeepan, Sithamparanathan
    Asghar, Muhammad Rizwan
    Russello, Giovanni
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 35
  • [8] Detecting DDoS Attacks in Software Defined Networks Using Deep Learning Techniques: A Survey
    Mwanza, Ntumpha P.
    Kalita, Jugal
    International Journal of Network Security, 2023, 25 (02) : 360 - 376
  • [9] Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network
    Cao, Yongyi
    Jiang, Hao
    Deng, Yuchuan
    Wu, Jing
    Zhou, Pan
    Luo, Wei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3855 - 3872
  • [10] Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm
    Ardakani, Mahdi Maleknasab
    Tabarzad, Mohammad Ali
    Shayegan, Mohammad Amin
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (14): : 16303 - 16335