A New IDS for Detecting DDoS Attacks in Wireless Networks using Spotted Hyena Optimization and Fuzzy Temporal CNN

被引:2
|
作者
Nalayini, C. M. [1 ]
Katiravan, Jeevaa [1 ]
机构
[1] Velammal Engn Coll, Dept Informat Technol, Chennai, India
来源
JOURNAL OF INTERNET TECHNOLOGY | 2023年 / 24卷 / 01期
关键词
Fuzzy Decision Tree; Feature selection; CNN; FT-CNN; LSTM; INTRUSION DETECTION; DEFENSE; FRAMEWORK; ALGORITHM; SYSTEM;
D O I
10.53106/160792642023012401003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks are rapidly increasing in the internet era due to the growth of information technology. The distributed denial of service (DDoS) attacks are increasing dramatically due to the distributed services in cloud networks. In this paper, a new Intrusion Detection System (IDS) is proposed to improve the performance of the networks by detecting DDoS attacks effectively in wireless networks. In this work, Feature Selection and Spotted Hyena Optimization Based Feature Optimization Method (SFSH-FOM) to select the terms of accuracy and false alarm rate.
引用
收藏
页码:23 / 34
页数:12
相关论文
共 50 条
  • [31] Detecting coordinated attacks in tactical wireless networks using cooperative signature-based detectors
    Little, Mike
    Ko, Calvin
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 176 - 182
  • [32] Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information
    Sarigiannidis, Panagiotis
    Karapistoli, Eirini
    Economides, Anastasios A.
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 7560 - 7572
  • [33] Presenting a New Approach for Clustering Optimization in Wireless Sensor Networks using Fuzzy Cuckoo Search Algorithm
    Zhou, Bing
    Li, Youyou
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 245 - 257
  • [34] Fuzzy Logic-based Decision Making for Detecting Distributed Node-Exhaustion Attacks in Wireless Sensor Networks
    Baig, Zubair A.
    Khan, Salman A.
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 185 - 189
  • [35] Dynamic trusted cross-layer IDS for secured communications in wireless networks using routing algorithm and FT-CNN
    Raj, K. R. Mohan
    Katiravan, Jeevaa
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (03) : 6171 - 6183
  • [36] A new clustering approach in wireless sensor networks using fuzzy system
    Mahnaz Toloueiashtian
    Homayun Motameni
    The Journal of Supercomputing, 2018, 74 : 717 - 737
  • [37] A new clustering approach in wireless sensor networks using fuzzy system
    Toloueiashtian, Mahnaz
    Motameni, Homayun
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (02): : 717 - 737
  • [38] Detecting Fault Location in Wireless Sensor Networks Using an Exploratory Method Based on Fuzzy Logic
    Tahmassebpour, Mahmoudreza
    2017 IEEE 4TH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2017, : 465 - 469
  • [39] Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station
    Mondal, Koushik
    Yadav, Satyendra Singh
    Pal, Vipin
    Singh, Akhilendra Pratap
    Yogita, Yogita
    Singh, Mangal
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2022, 13 (06)
  • [40] A New Approach for Target Coverage in Wireless Sensor Networks using Fuzzy Logic
    Banimelhem, Omar
    Taqieddin, Eyad
    Al-Ma'aqbeh, Feda'
    2013 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013, : 837 - 842