2020
DOI: 10.1016/j.future.2020.03.049
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms

Abstract: Cloud computing environment support resource sharing as cloud service over the internet. It enables the users to outsource data into the cloud server that can be accessed remotely from various devices distributed geographically. Accessing resources from the cloud causes various security issues as the attackers try to illegally access the data. The distributed denial of service (DDoS) attack is one of the security concern in the cloud server. DDoS is a kind of cyber attack which disrupt normal traffic of target… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(29 citation statements)
references
References 23 publications
0
21
0
Order By: Relevance
“…In the paper [12], a fuzzy method called (T-EHO) based on DBN classification algorithm is presented for detecting DDoS attacks. The method of learning fuzzy rules was evaluated when the FT-EHO algorithm was used instead of the genetic algorithm.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the paper [12], a fuzzy method called (T-EHO) based on DBN classification algorithm is presented for detecting DDoS attacks. The method of learning fuzzy rules was evaluated when the FT-EHO algorithm was used instead of the genetic algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Accuracy, Precision, F-Measure, TPR, and FPR from Equations ( 8) to (12) are used to evaluate the proposed approach. In these equations  TP: the number of samples of attack flows that have been correctly detected.…”
Section: Performance Measurementioning
confidence: 99%
“…Gopal Singh Kushwah and Virender Ranga [17] presented DDoS attacks detection model in the cloud. This built with the Voting Extreme Learning Machine.…”
Section: Literature Surveymentioning
confidence: 99%
“…Recently, DBN is most valued for its versatile ability and has exposed great success in unsupervised feature dimensionality reduction and supervised pattern classification [41] , [42] . But only limited studies in literature have used DBN in the field of intrusion detection [43] , [44] . Also, the authors in these studies have not focused to investigate the influence of feature selection on DBN.…”
Section: The Classifier Scheme For Intrusion Detectionmentioning
confidence: 99%