An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network

被引:2
作者
Boopathi, Mythili [1 ]
Chavan, Meena [2 ]
Jebanazer, J. Jeneetha [3 ]
Kumar, Sanjay Nakharu Prasad [4 ]
机构
[1] Vellore Inst Technol, Dept Informat Technol, Chennai, Tamil Nadu, India
[2] Bharati Vidyapeeth Univ, Dept Elect & Commun Engn, Coll Engn, Pune, Maharashtra, India
[3] Panimalar Engn Coll, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
[4] Sch Engn & Appl Sci, San Francisco, CA USA
关键词
Denial of service; Deep maxout network; Sine cosine algorithm; Pearson correlation; Anti coronavirus optimization algorithm; DDOS ATTACK; SECURITY ISSUES; ALGORITHM;
D O I
10.1108/IJPCC-05-2022-0197
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method. Design/methodology/approach This paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques. Findings The SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively. Originality/value The DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.
引用
收藏
页码:666 / 688
页数:23
相关论文
共 41 条
[1]   Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application [J].
Agarwal, Ankit ;
Khari, Manju ;
Singh, Rajiv .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) :419-439
[2]  
Alqarni AA, 2022, J CYBER SECUR MOBIL, DOI [10.13052/jcsm2245-1439.1126, https://doi.org/10.13052/jcsm2245-1439.1126, DOI 10.13052/JCSM2245-1439.1126]
[3]  
Ansari M.D., 2021, ICCCE 2020 P 3 INT C, V698, P1419, DOI 10.1007/978-981-15-7961-5_129
[4]   Spider Monkey Optimization algorithm for numerical optimization [J].
Bansal, Jagdish Chand ;
Sharma, Harish ;
Jadon, Shimpi Singh ;
Clerc, Maurice .
MEMETIC COMPUTING, 2014, 6 (01) :31-47
[5]   Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud [J].
Bhardwaj, Aanshi ;
Mangat, Veenu ;
Vig, Renu .
IEEE ACCESS, 2020, 8 :181916-181929
[6]   Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm [J].
Cakmakci, Salva Daneshgadeh ;
Kemmerich, Thomas ;
Ahmed, Tarem ;
Baykal, Nazife .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 168
[7]   A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment [J].
Choi, Junho ;
Choi, Chang ;
Ko, Byeongkyu ;
Kim, Pankoo .
SOFT COMPUTING, 2014, 18 (09) :1697-1703
[8]   Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks [J].
Chonka, Ashley ;
Xiang, Yang ;
Zhou, Wanlei ;
Bonti, Alessio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1097-1107
[9]  
Department of Computer Science & Engineering Madan Mohan Malaviya University Of Technology Gorakhpur U.P. India, 2022, International Journal of Computer Systems & Software Engineering, V8, P69, DOI [10.15282/ijsecs.8.1.2022.7.0097, 10.15282/ijsecs.8.1.2022.7.0097, DOI 10.15282/IJSECS.8.1.2022.7.0097]
[10]   Understanding DDoS Attack & Its Effect In Cloud Environment [J].
Deshmukh, Rashmi V. ;
Devadkar, Kailas K. .
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 :202-210