共 50 条
Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology
被引:13
作者:
Ilyas, Benkhaddra
[1
,4
]
Kumar, Abhishek
[2
]
Setitra, Mohamed Ali
[3
]
Bensalem, ZineEl Abidine
[3
]
Lei, Hang
[1
]
机构:
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Peoples R China
[2] Chandigarh Univ, Dept Comp Sci & Engn, Mohali, Punjab, India
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
关键词:
DEFENSE-MECHANISMS;
NETWORK;
D O I:
10.1002/ett.4729
中图分类号:
TN [电子技术、通信技术];
学科分类号:
0809 ;
摘要:
The attack named Distributed Denial of Service (DDoS) that takes place in the large blockchain network requires an efficient and robust attack detection and prevention mechanism for authenticated access. Blockchain is a distributed network in which the attacker tries to hack the network by utilizing all the resources with the application of enormous requests. Several methods like Rival Technique, filter modular approach and so on, were developed to detect and prevent the DDoS attack in the blockchain; still, detection accuracy is a challenging task. Hence, this research introduces an efficient technique using optimization-based deep learning by considering the blockchain network and smart contract for the detection and prevention of DDoS attacks. Based on the user request, the traffic is analyzed, and the verification using the smart contract is made to find the authenticated user. After the verification, the response is provided for the authenticated user, and the suspicious traffic is utilized for the detection of DDoS attacks using the Poaching Raptor Optimization-based deep neural network (Poaching Raptor-based DNN), in which the classifier is tuned using the proposed optimization algorithm to reduce the training loss. The proposed algorithm is designed by hybridizing the habitual practice of the raptor by considering the concurring behavior, hunting style along with poaching behavior of the Lobo to enhance the detection accuracy. After the attack detection, the nonattacker is responded, and the attacker is prevented by entering the IP/MAC address in the logfile. The performance of the proposed method is evaluated in terms of recall, precision, FPR, and accuracy and obtained the values of 96.3%, 98.22%, 3.33%, and 95.12%, respectively.
引用
收藏
页数:24
相关论文