2022
DOI: 10.1142/s021964922250071x
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Detection System for DDoS Attacks Based on Deep Sparse Autoencoder and Light Gradient Boost Machine

Abstract: In the internet era, network-based services and connected devices are growing with many users, thus it became an increase in the number of cyberattacks. Distributed Denial of Service (DDoS) attacks are the type of cyberattacks increasing their strength and impact on the victim. Effective detection of such attacks through a DDoS Detection System is relatively essential research. Although machine learning techniques have grown in popularity in the field of cybersecurity over the last several years, the change in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…We executed a deep dive into DDOSPOT honeypot as it had been found to report the highest frequency of hits at both instances. A variety of automated tools and services offered by third-party suppliers for DDoS as a service make it simple to start DDoS attacks 47 , 48 . It is easy for even a beginner in attacking to initiate sophisticated DDoS assaults by using the key aspects of cloud technology.…”
Section: Analysis Of the Captured Datamentioning
confidence: 99%
“…We executed a deep dive into DDOSPOT honeypot as it had been found to report the highest frequency of hits at both instances. A variety of automated tools and services offered by third-party suppliers for DDoS as a service make it simple to start DDoS attacks 47 , 48 . It is easy for even a beginner in attacking to initiate sophisticated DDoS assaults by using the key aspects of cloud technology.…”
Section: Analysis Of the Captured Datamentioning
confidence: 99%
“…Ensuring uniform feature map sizes is necessary for conducting feature fusion operations. Subsequently, the convolutional block attention module (CBAM) [5] is incorporated into the lateral connections to fine-tune the feature maps layer by layer. This integration aids in reducing false detections and enhancing feature extraction accuracy.…”
Section: Feature Extraction By Pyramid Atrous Attention Modulementioning
confidence: 99%
“…They might cause the loss of priceless sensitive data, such as hospital files, military records, etc. Furthermore, they can disable phone and computer Future Internet 2023, 15, 297 2 of 19 networks, making data unavailable or rendering systems unusable [5][6][7]. Banking and government networks are particularly vulnerable because of the tremendous value of the data they contain.…”
Section: Introductionmentioning
confidence: 99%
“…The compressed form of the input is stored in the latent space. The AE technique [33] tries to recreate the input at the output to get comparable input and output, i.e., .…”
Section: 2data Preprocessingmentioning
confidence: 99%