A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques
نویسندگان
چکیده
The recent development of cloud computing offers various services on demand for organization and individual users, such as storage, shared space, networking, etc. Although Cloud Computing provides advantages it remains vulnerable to many types attacks that attract cyber criminals. Distributed Denial Service (DDoS) is the most common type attack computing. Consequently, professionals security experts have focused growth preventive processes towards DDoS attacks. Since become increasingly widespread, becomes difficult some methods based network flow features distinguish Further, monitoring pattern traffic changes accurate detection are important urgent. In this research work, deep belief feature extraction Hybrid Long Short-Term Memory (LSTM) model been proposed with NSL-KDD dataset. LSTM method, Particle Swarm Optimization (PSO) technique, which combined optimize weights neural network, reduces prediction error. This method used extract IP packets, identifies PSO-LSTM model. Moreover, accurately predicts normal detects anomalies resulting from architecture outperforms classification techniques including standard Support Vector Machine (SVM) in terms performance along results measurement accuracy, recall, f-measure, precision.
منابع مشابه
A Prevention of Ddos Attacks in Cloud Using Neif Techniques
In recent years, most of the organizations in the world have increasingly realized the importance of cloud platforms. The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users. However Cloud Computing has more applications but there are many challenges that are facing by a Cloud environment. In recent years, the major attacks in cloud...
متن کاملDDoS Attacks in Cloud and Mitigation Techniques
The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users.Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its consumers in multitenant en...
متن کاملA Defense Framework for Flooding-based DDoS Attacks
Distributed denial of service (DDoS) attacks are widely regarded as a major threat to the Internet. A flooding-based DDoS attack is a very common way to attack a victim machine by sending a large amount of malicious traffic. Existing networklevel congestion control mechanisms are inadequate in preventing service quality from deteriorating because of these attacks. Although a number of technique...
متن کاملA Review on Various Machine Learning Techniques for the Detection of DDoS Attacks
The key objective of distributed denial of service attack is to compile the multiple systems across the internet with infected agents and these agents are designed to and programmed to launch the packet flood. With the increase in popularity of internet there are number of security issues and to handle these issues intrusion detection system (IDS) and intrusion prevention systems (IPS) are empl...
متن کاملA PCA BASED FRAMEWORK FOR DETECTION OF APPLICATION LAYER DDoS ATTACKS
Hackers uses Distributed Denial of Service (DDoS) and leaves hundreds and thousands of bots to overwhelm the victim in terms of bandwidth and reduce the services that are rendering to the users. To initiate an attack against victim, hackers use the internet as their venue. To address this threat various methods were proposed, but all the earlier method identifies the DDoS attack that exists in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2023
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2023.032078