4.6 Article

Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks

期刊

NEURAL COMPUTING & APPLICATIONS
卷 34, 期 4, 页码 2869-2882

出版社

SPRINGER LONDON LTD
DOI: 10.1007/s00521-021-06565-8

关键词

Convolutional neural network; Cumulative incarnation; Deep learning; DDoS attacks; Neural network tuning; Optimization

向作者/读者索取更多资源

This article introduces an optimized deep neural network structure for detecting DDoS attacks, using the CuI optimization technique. Experimental results show that this optimization method outperforms existing techniques and achieves significant performance improvement.
In today's technological world, distributed denial of service (DDoS) attacks threaten Internet users by flooding huge network traffic to make critical Internet services unavailable to genuine users. Therefore, design of DDoS attack detection system is on urge to mitigate these attacks for protecting the critical services. Nowadays, deep learning techniques are extensively used to detect these attacks. The existing deep feature learning approaches face the lacuna of designing an appropriate deep neural network structure for detection of DDoS attacks which leads to poor performance in terms of accuracy and false alarm. In this article, a tuned vector convolutional deep neural network (TVCDNN) is proposed by optimizing the structure and parameters of the deep neural network using binary and real cumulative incarnation (CuI), respectively. The CuI is a genetic-based optimization technique which optimizes the tuning process by providing values generated from best-fit parents. The TVCDNN is tested with publicly available benchmark network traffic datasets and compared with existing classifiers and optimization techniques. It is evident that the proposed optimization approach yields promising results compared to the existing optimization techniques. Further, the proposed approach achieves significant improvement in performance over the state-of-the-art attack detection systems.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据