Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta-heuristic approach

被引:0
作者
Aliar, Ahamed Ali Samsu [1 ]
Gowri, V. [2 ]
Abins, A. Arockia [1 ]
机构
[1] Easwari Engn Coll, Dept Comp Sci & Engn, Chennai, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Ramapuram, India
关键词
DDOS ATTACKS; FRAMEWORK; ALGORITHM; MACHINE; SDN;
D O I
10.1002/ett.4921
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The biggest firms throughout the world now are the ones that offer services in the cloud. One of the top problems for cloud users (CUs) and cloud service providers (CSPs) is the availability of cloud-based services whenever needed. A distributed denial of service (DDoS) assault has been a significant threat to the security of the system in recent years. DDoS defense and detection of these attacks have become hot topics of research for academia and business. However, most approaches cannot accomplish efficient detection outcomes with few false alarms. As a result, minimizing the consequences of DDoS attacks allows CSPs to offer CUs high-quality services. In the cloud sector, a collective deep structured algorithm is suggested to identify DDoS attacks successfully. The recommended method contains several stages: data acquisition, pre-processing, optimal feature detection, and selection. The first step is the acquisition of data using the help of publicly available sources. Further, the input data undergoes preprocessing. Consequently, the optimal weighted feature selection takes place on the preprocessed data, where the optimization is done with the aid of the Hybrid Border Collie and Dragonfly Algorithm (HBCDA). Finally, DDoS attack detection is achieved via a novel method known as adaptive deep dilated ensemble (ADDE), which includes, one-dimensional convolutional neural network (1DCNN), deep temporal convolutional neural network (DTCNN), recurrent neural network (RNN), and bidirectional long short-term memory (Bi-LSTM). For the attainment of optimal results, the parameter tuning is accomplished by using the HBCDA approach. The detection outcome is computed by using the fuzzy ranking mechanism. The validation is done for the suggested method model, and its corresponding findings are validated with conventional techniques. Hence, the suggested approach outperforms the detection performance and ensures more efficiency than traditional approaches.
引用
收藏
页数:34
相关论文
共 36 条
[1]   Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3769-3795
[2]   Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron [J].
Ahmed, Sheeraz ;
Khan, Zahoor Ali ;
Mohsin, Syed Muhammad ;
Latif, Shahid ;
Aslam, Sheraz ;
Mujlid, Hana ;
Adil, Muhammad ;
Najam, Zeeshan .
FUTURE INTERNET, 2023, 15 (02)
[3]   An efficient SVM based DEHO classifier to detect DDoS attack in cloud computing environment [J].
Alam, Gowthul M. M. ;
Kumar, Jerald Nirmal S. ;
Mageswari, Uma R. ;
Raj, Michael T. F. .
COMPUTER NETWORKS, 2022, 215
[4]   Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments [J].
Aljuhani, Ahamed .
IEEE ACCESS, 2021, 9 (42236-42264) :42236-42264
[5]   A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment [J].
Aydin, Hakan ;
Orman, Zeynep ;
Aydin, Muhammed Ali .
COMPUTERS & SECURITY, 2022, 118
[6]   Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud [J].
Bhardwaj, Aanshi ;
Mangat, Veenu ;
Vig, Renu .
IEEE ACCESS, 2020, 8 :181916-181929
[7]   A LDDoS-Aware Energy-Efficient Multipathing Scheme for Mobile Cloud Computing Systems [J].
Cao, Yuanlong ;
Song, Fei ;
Liu, Qinghua ;
Huang, Minghe ;
Wang, Hao ;
You, Ilsun .
IEEE ACCESS, 2017, 5 :21862-21872
[8]   An inline detection and prevention framework for distributed denial of service attacks [J].
Chen, Zhongqiang ;
Chen, Zhongrong ;
Delis, Alex .
COMPUTER JOURNAL, 2007, 50 (01) :7-40
[9]   A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment [J].
Choi, Junho ;
Choi, Chang ;
Ko, Byeongkyu ;
Kim, Pankoo .
SOFT COMPUTING, 2014, 18 (09) :1697-1703
[10]   Boosting-Based DDoS Detection in Internet of Things Systems [J].
Cvitic, Ivan ;
Perakovic, Dragan ;
Gupta, Brij B. ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03) :2109-2123