An efficient SVM based DEHO classifier to detect DDoS attack in cloud computing environment

被引:16
作者
Alam, Gowthul M. M. [1 ]
Kumar, Jerald Nirmal S. [2 ]
Mageswari, Uma R. [3 ]
Raj, Michael T. F. [2 ]
机构
[1] Presidency Univ, Dept Comp Sci & Engn, Bengaluru, India
[2] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, India
[3] Vardhaman Coll Engn, Dept Comp Sci & Engn, Hyderabad, India
关键词
DDoS attack; Cloud; DEHO; SVM; KPCA; Databases; Data samples; Cyber security; LOAD;
D O I
10.1016/j.comnet.2022.109138
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed denial of service (DDoS) attacks is rising exponentially and creates a severe threat to security. Generally, the DDoS attack may appear uncomplicated but they are hard to prevent and considered as one of the most significant cybersecurity issues. Hence, addressing against DDoS attacks turns out to be imperative. The major goal of this paper involves the optimal detection of data samples as normal data samples and malicious/ attacked data samples. This paper proposes a security algorithm against DDoS attacks by employing four significant phases namely the Database training phase, Data pre-processing phase, Feature selection phase and Classification phase. Initially, the data samples are to be trained before using it for attack detection. Later, the sample group is created for every file and the data samples are pre-processed in the data pre-processing phase. Secondly, in feature selection phase, the selected features are optimized by employing kernel principal component analysis (KPCA) to obtain optimal features. Later, in the classification phase, a support vector machine-based discrete elephant herding optimization (SVM-DEHO) classifier is utilized to detect the data sample as normal data and attacked or malicious data. Finally, the proposed approach is examined for four different databases namely NSL-KDD, UNSW-NB15, ISCX ID and CIC-IDS2017 databases respectively. The experimental analyses are performed for various simulation metrics and the outcome reveals that the detection system performances are high using SVM-DEHO approach than other approaches.
引用
收藏
页数:12
相关论文
共 30 条
[1]   Emerging evolutionary algorithm integrated with kernel principal component analysis for modeling the performance of a water treatment plant [J].
Abba, S., I ;
Quoc Bao Pham ;
Usman, A. G. ;
Nguyen Thi Thuy Linh ;
Aliyu, D. S. ;
Quyen Nguyen ;
Quang-Vu Bach .
JOURNAL OF WATER PROCESS ENGINEERING, 2020, 33
[2]   Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application [J].
Agarwal, Ankit ;
Khari, Manju ;
Singh, Rajiv .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) :419-439
[3]   Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks [J].
Amma, Bhuvaneswari N. G. ;
Selvakumar, S. .
NEUROCOMPUTING, 2019, 340 :294-308
[4]   Season specific approach for short-term load forecasting based on hybrid FA-SVM and similarity concept [J].
Barman, Mayur ;
Choudhury, Nalin Behari Dev .
ENERGY, 2019, 174 :886-896
[5]  
Cao Y., 2021, IEEE T DEPEND SECURE
[6]  
Cheng J., 2018, SECURITY COMMUNICATI
[7]   An Integration of Archerfish Hunter Spotted Hyena Optimization and Improved ELM Classifier for Multicollinear Big Data Classification Tasks [J].
Chidambaram, S. ;
Gowthul Alam, M. M. .
NEURAL PROCESSING LETTERS, 2022, 54 (03) :2049-2077
[8]   A Profile-Based Novel Framework for Detecting EDoS Attacks in the Cloud Environment [J].
Dennis, J. Britto ;
Priya, M. Shanmuga .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) :3487-3503
[9]  
Ding HW, 2018, 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), P911, DOI 10.1109/ICCT.2018.8600090
[10]   Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection [J].
Doriguzzi-Corin, R. ;
Millar, S. ;
Scott-Hayward, S. ;
Martinez-del-Rincon, J. ;
Siracusa, D. .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02) :876-889