A Modified Cascaded Feed Froward Neural Network Distributed Denial of Service Attack Detection using Improved Regression based Machine Leaning Approach

被引:2
作者
Mishra, Akhil [1 ]
Shrivastava, Ritu [2 ]
Yadav, Pranay [3 ]
机构
[1] Sagar Inst Technol & Sci SIRTS, Dept Comp Sci & Engn CSE, Bhopal, India
[2] Sagar Inst Res & Technol SIRT, Dept Comp Sci & Engn CSE, Bhopal, India
[3] Maulana Azad Natl Inst Technol MANIT, Dept Comp Sci Engn CSE, Bhopal, India
来源
2022 6TH INTERNATIONAL CONFERENCE ON TRENDS IN ELECTRONICS AND INFORMATICS, ICOEI 2022 | 2020年
关键词
D-DoS Attack; Cyber-attack; Confusion Matrix; Cascaded Feed Forward Neural Network (CCFFNN); Levenberg-Marquardt; Botnets; DDOS ATTACKS;
D O I
10.1109/ICOEI53556.2022.9776819
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud and its applications have been growing rapidly in the last decade, but every coin has two sides: positive and negative. The good thing about that is that online work is growing quickly, but the bad thing is that attacks are becoming more and more powerful. In the current generation, cyber-attacks are one of the most threatening issues for cloud-based applications. Different cloud attacks are presented, in which Denial of Service (DDoS) is one of the perilous attacks that consume the network bandwidth as well as computing resources of a targeted system. Users of the cloud service now have protection against DDoS attacks that are caused by people who haven't been given permission. In order to prevent the D-DoS attack, this research work has presented a modified feature selection approach. The proposed machine learning approach is separated into three parts: training, testing, and validation. The training of the proposed method requires a previous attack dataset. In 2017, the Canadian Institute of Cyber Security presented a data set for D-DoS attacks. This attack contains four categories, which are labelled as "Slowloris," "Slowhttptest," " Hulk," and "Begian.". For weight optimization, the proposed method employs the Levenberg-Marquardt method, and for validation, a cascaded feed-forward neural network is used. It is well known that, the machine learning algorithms consume a huge amount of time to train models. Introducing a fast training for parallel processing model will make it an efficient tool to reduce the time consumed for training process. It has been shown that the presented approach gives an adequate improvement in accuracy, that is, 99.96%.
引用
收藏
页码:1292 / 1299
页数:8
相关论文
共 26 条
[1]  
Ahmed ME, 2017, IEEE MILIT COMMUN C, P11, DOI 10.1109/MILCOM.2017.8170802
[2]   A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning [J].
Arturo Perez-Diaz, Jesus ;
Amezcua Valdovinos, Ismael ;
Choo, Kim-Kwang Raymond ;
Zhu, Dakai .
IEEE ACCESS, 2020, 8 :155859-155872
[3]  
Chavate Shrikant, 2021, 2021 10 INT C SYST M, P1
[4]  
Chen J. I.-Z., 2021, J. Artif. Intell. Capsule Netw., V3, P101
[5]  
Dayal N, 2018, INT CONF COMMUN SYST, P17, DOI 10.1109/COMSNETS.2018.8328175
[6]   The DDoS attacks detection through machine learning and statistical methods in SDN [J].
Dehkordi, Afsaneh Banitalebi ;
Soltanaghaei, MohammadReza ;
Boroujeni, Farsad Zamani .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (03) :2383-2415
[7]   Multi-input CNN-GRU based human activity recognition using wearable sensors [J].
Dua, Nidhi ;
Singh, Shiva Nand ;
Semwal, Vijay Bhaskar .
COMPUTING, 2021, 103 (07) :1461-1478
[8]  
Haris S. H. C., 2010, Proceedings of the 2010 Second International Conference on Network Applications Protocols and Services (NETAPPS 2010), P240, DOI 10.1109/NETAPPS.2010.50
[9]  
Kumar M., 2009, CiiT International Journal of Networking and Communication Engineering
[10]  
Maurya S, 2018, 2018 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATION AND TELECOMMUNICATION (ICACAT)