Reddy, K. Balachandra and Meera, S. (2024) DDoS attack detection in cloud using ensemble model tuned with optimal hyperparameter. International Journal of Adaptive Control and Signal Processing, 38 (5). pp. 1594-1620. ISSN 0890-6327
Full text not available from this repository. (Request a copy)Abstract
DDoS attack detection in cloud using ensemble model tuned with optimal hyperparameter K. Balachandra Reddy Department of Computer Science and Engineering Vels Institute of Science, Technology & Advanced Studies (VISTAS) Chennai Tamil Nadu India https://orcid.org/0000-0001-8850-1130 S. Meera Department of Computer Science and Engineering Vels Institute of Science, Technology & Advanced Studies (VISTAS) Chennai Tamil Nadu India https://orcid.org/0000-0002-7964-7012 Summary
DDoS attacks are a type of cloud incursion that lessen service degradation. DDoS attacks target the cloud network with invalid requests, rejecting legitimate requests. Such attacks disrupt the entire cloud architecture, thus it needs efficient detection methods to spot their presence. This study proposes a novel ensemble classification model for DDoS incursion detection. Pre‐processing, feature extraction, and attack detection are the three main components of the suggested intrusion detection system. Improved data imbalance processing is processed during pre‐processing. Features including HOS‐based features enhanced entropy‐based features, correlation features, and raw features are extracted from the pre‐processed data. The generated features are trained using an ensemble model, which integrates classifiers like SVM, RF, NN, LSTM, and DRN, during the attack detection phase. A new hybrid approach known as TUDMA optimally trains the model by setting the ideal weight because DRN provides the final detected outcome. By reducing errors, this ideal training will guarantee an improvement in detection results. The suggested hybrid optimization combines the two techniques, TDO and DMO. The accuracy of the methods FS‐WOA‐DNN, RBF‐PSO, SMA, BRO, SLO, and NMRA was 86.73%, 85.69%, 84.58%, 87.43%, 88.91%, and 89.78%, respectively, while the accuracy of the TUDMA was 95.34% in the 80th learning percentage. Finally, for many measurements, the suggested efficiency is superior to the traditional methods.
03 2024 05 2024 1594 1620 10.1002/acs.3766 2 10.1002/crossmark_policy onlinelibrary.wiley.com true 2023-06-23 2024-01-24 2024-03-01 http://onlinelibrary.wiley.com/termsAndConditions#vor 10.1002/acs.3766 https://onlinelibrary.wiley.com/doi/10.1002/acs.3766 https://onlinelibrary.wiley.com/doi/pdf/10.1002/acs.3766 10.1109/ACCESS.2019.2896783 10.1007/s11235-020-00747-w 10.1109/TSC.2017.2694426 10.1007/s11277‐020‐07125‐4 10.1109/TSC.2017.2694426 10.1007/s13369‐019‐04178‐x 10.1007/s12652‐018‐0800‐9 10.1007/s12065‐019‐00244‐3 10.1109/ACCESS.2021.3126535 10.1016/j.cose.2021.102260 10.1007/s12065‐019‐00340‐4 10.4018/IJSWIS.297143 10.1007/s10586‐021‐03234‐2 10.4018/IJSSCI.309707 10.1109/JIOT.2020.2973176 10.1007/s42044‐019‐00039‐w Turk Online J Qual Inq Kanimozhi S 13 2022 Detection of DDoS attack using machine learning algorithms in cloud computing 10.1007/s10922‐020‐09578‐1 10.1016/j.jpdc.2021.03.005 10.1007/s11276‐021‐02604‐3 10.1109/JIOT.2021.3090909 10.1007/s12652‐018‐0754‐y 10.1007/s10586‐019‐03031‐y 10.1007/s11277‐020‐07630‐6 10.1007/s11277‐021‐08271‐z 10.1109/TCCN.2022.3186331 10.1109/ACCESS.2019.2922196 10.1109/ACCESS.2020.3028690 10.48185/jaai.v3i1.450 10.1016/j.micpro.2023.104823 10.1016/j.procs.2020.03.282 10.1007/s12652-020-01916-0 J Electr Syst Inf Technol Bansal M 4 2017 A new entropy function for feature extraction with the refined scores as a classifier for the unconstrained ear verification Comput Commun Maussang F 166 2021 An ensemble learning and fog‐cloud architecture‐driven cyber‐attack detection framework for IoMT networks 10.1109/TSG.2018.2844307 J Bionic Eng Agushaka JO 114570 391 2022 Improved dwarf mongoose optimization for constrained engineering design problems IEEE Access Dehghani M 10 2022 10.1109/ACCESS.2022.3151641 Tasmanian devil optimization: a new bio‐inspired optimization algorithm for solving optimization algorithm J Comput Eng Mhd. Furqan H 19 2017 Performance of arithmetic crossover and heuristic crossover in genetic algorithm based on alpha parameter https://www.kaggle.com/datasets/yashwanthkumbam/apaddos‐dataset https://www.kaggle.com/general/155948
Item Type: | Article |
---|---|
Subjects: | Computer Science Engineering > Cloud Computing |
Divisions: | Computer Science Engineering |
Depositing User: | Mr IR Admin |
Date Deposited: | 06 Oct 2024 06:41 |
Last Modified: | 06 Oct 2024 06:41 |
URI: | https://ir.vistas.ac.in/id/eprint/8822 |