4.6 Article

Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks

Journal

NEURAL COMPUTING & APPLICATIONS
Volume 34, Issue 4, Pages 2869-2882

Publisher

SPRINGER LONDON LTD
DOI: 10.1007/s00521-021-06565-8

Keywords

Convolutional neural network; Cumulative incarnation; Deep learning; DDoS attacks; Neural network tuning; Optimization

Ask authors/readers for more resources

This article introduces an optimized deep neural network structure for detecting DDoS attacks, using the CuI optimization technique. Experimental results show that this optimization method outperforms existing techniques and achieves significant performance improvement.
In today's technological world, distributed denial of service (DDoS) attacks threaten Internet users by flooding huge network traffic to make critical Internet services unavailable to genuine users. Therefore, design of DDoS attack detection system is on urge to mitigate these attacks for protecting the critical services. Nowadays, deep learning techniques are extensively used to detect these attacks. The existing deep feature learning approaches face the lacuna of designing an appropriate deep neural network structure for detection of DDoS attacks which leads to poor performance in terms of accuracy and false alarm. In this article, a tuned vector convolutional deep neural network (TVCDNN) is proposed by optimizing the structure and parameters of the deep neural network using binary and real cumulative incarnation (CuI), respectively. The CuI is a genetic-based optimization technique which optimizes the tuning process by providing values generated from best-fit parents. The TVCDNN is tested with publicly available benchmark network traffic datasets and compared with existing classifiers and optimization techniques. It is evident that the proposed optimization approach yields promising results compared to the existing optimization techniques. Further, the proposed approach achieves significant improvement in performance over the state-of-the-art attack detection systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available