Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology

被引:13
作者
Ilyas, Benkhaddra [1 ,4 ]
Kumar, Abhishek [2 ]
Setitra, Mohamed Ali [3 ]
Bensalem, ZineEl Abidine [3 ]
Lei, Hang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Peoples R China
[2] Chandigarh Univ, Dept Comp Sci & Engn, Mohali, Punjab, India
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
关键词
DEFENSE-MECHANISMS; NETWORK;
D O I
10.1002/ett.4729
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The attack named Distributed Denial of Service (DDoS) that takes place in the large blockchain network requires an efficient and robust attack detection and prevention mechanism for authenticated access. Blockchain is a distributed network in which the attacker tries to hack the network by utilizing all the resources with the application of enormous requests. Several methods like Rival Technique, filter modular approach and so on, were developed to detect and prevent the DDoS attack in the blockchain; still, detection accuracy is a challenging task. Hence, this research introduces an efficient technique using optimization-based deep learning by considering the blockchain network and smart contract for the detection and prevention of DDoS attacks. Based on the user request, the traffic is analyzed, and the verification using the smart contract is made to find the authenticated user. After the verification, the response is provided for the authenticated user, and the suspicious traffic is utilized for the detection of DDoS attacks using the Poaching Raptor Optimization-based deep neural network (Poaching Raptor-based DNN), in which the classifier is tuned using the proposed optimization algorithm to reduce the training loss. The proposed algorithm is designed by hybridizing the habitual practice of the raptor by considering the concurring behavior, hunting style along with poaching behavior of the Lobo to enhance the detection accuracy. After the attack detection, the nonattacker is responded, and the attacker is prevented by entering the IP/MAC address in the logfile. The performance of the proposed method is evaluated in terms of recall, precision, FPR, and accuracy and obtained the values of 96.3%, 98.22%, 3.33%, and 95.12%, respectively.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] Real-time power prediction approach for turbine using deep learning techniques
    Sun, Lei
    Liu, Tianyuan
    Xie, Yonghui
    Zhang, Di
    Xia, Xinlei
    ENERGY, 2021, 233
  • [32] A Multi-Attention Approach for Person Re-Identification Using Deep Learning
    Saber, Shimaa
    Meshoul, Souham
    Amin, Khalid
    Plawiak, Pawel
    Hammad, Mohamed
    SENSORS, 2023, 23 (07)
  • [33] A Deep Learning-Based Indoor Positioning Approach Using Channel and Spatial Attention
    Zhang, Jiawei
    Xu, Zhendong
    Zhang, Shiyu
    Hu, Keke
    Shen, Yuan
    IEEE COMMUNICATIONS LETTERS, 2025, 29 (02) : 373 - 377
  • [34] Evolution of single-lead ECG for STEMI detection using a deep learning approach
    Gibson, C. Michael
    Mehta, Sameer
    Ceschim, Mariana R. S.
    Frauenfelder, Alejandra
    Vieira, Daniel
    Botelho, Roberto
    Fernandez, Francisco
    Villagran, Carlos
    Niklitschek, Sebastian
    Matheus, Cristina, I
    Pinto, Gladys
    Vallenilla, Isabella
    Lopez, Claudia
    Acosta, Maria, I
    Munguia, Anibal
    Fitzgerald, Clara
    Mazzini, Jorge
    Pisana, Lorena
    Quintero, Samantha
    INTERNATIONAL JOURNAL OF CARDIOLOGY, 2022, 346 : 47 - 52
  • [35] Efficient Collision Risk Prediction Model for Autonomous Vehicle Using Novel Optimized LSTM Based Deep Learning Framework
    Hema, D. Deva
    Jaison, T. Rajeeth
    INTERNATIONAL JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS RESEARCH, 2024, 22 (02) : 352 - 362
  • [36] Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives
    Bello, Ibrahim
    Chiroma, Haruna
    Abdullahi, Usman A.
    Gital, Abdulsalam Ya'u
    Jauro, Fatsuma
    Khan, Abdullah
    Okesola, Julius O.
    Abdulhamid, Shafi'i M.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) : 8699 - 8717
  • [37] Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm
    Abd Elaziz, Mohamed
    Al-qaness, Mohammed A. A.
    Dahou, Abdelghani
    Ibrahim, Rehab Ali
    Abd El-Latif, Ahmed A.
    ADVANCES IN ENGINEERING SOFTWARE, 2023, 176
  • [38] INTELLIGENT SPEECH RECOGNITION USING FRACTAL AMENDED GRASSHOPPER OPTIMIZATION ALGORITHM WITH DEEP LEARNING APPROACH
    Al-Anazi, Reema G.
    Al-Dobaian, Abdullah Saad
    Hassan, Asma Abbas
    Almanea, Manar
    Alghamdi, Ayman Ahmad
    Asklany, Somia A.
    Al Sultan, Hanan
    Majdoubi, Jihen
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2024, 32 (09N10)
  • [39] Lamb wave-based damage assessment for composite laminates using a deep learning approach
    Zhang, Han
    Wang, Fan
    Lin, Jing
    Hua, Jiadong
    ULTRASONICS, 2024, 141
  • [40] A DEEP TRANSFER LEARNING APPROACH FOR IOT/IIOT CYBER ATTACK DETECTION USING TELEMETRY DATA
    Poonkuzhali, S.
    Shobana, M.
    Jeyalakshmi, J.
    NEURAL NETWORK WORLD, 2023, 33 (04) : 225 - 244