2022
DOI: 10.1002/cpe.7547
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid classifier strategy with tuned training weights for distributed denial of service attack detection

Abstract: Summary The 5G wireless networks associated with higher data‐transferring speeds considerably affect the performance of IoT networks. Nowadays, the Internet has become a very significant aspect of human lives, and it aids in data transfers, processing, and storing. However, 5G networks are subjected to varied cyber security attacks, which are hard to detect. As a result, it is required to set up attack detection models that can recognize 5G network's distributed denial of service (DDoS) attack. Thereby, this a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 40 publications
(71 reference statements)
0
5
0
Order By: Relevance
“…These methods use deep belief networks (DBN) and probabilistic neural networks (PNN), 27 or train DBN as a classifier. 28,29 CNNs have also been proposed as a novel network intrusion detection model. 30 Another study investigated an artificial intelligence (AI) intrusion detection system using a DNN and tested it on the KDD Cup 99 data set.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These methods use deep belief networks (DBN) and probabilistic neural networks (PNN), 27 or train DBN as a classifier. 28,29 CNNs have also been proposed as a novel network intrusion detection model. 30 Another study investigated an artificial intelligence (AI) intrusion detection system using a DNN and tested it on the KDD Cup 99 data set.…”
Section: Related Workmentioning
confidence: 99%
“…Research has shown that deep learning has superior performance in image and speech recognition, leading to the proposal of deep learning‐based traffic anomaly detection methods for intrusion detection. These methods use deep belief networks (DBN) and probabilistic neural networks (PNN), 27 or train DBN as a classifier 28,29 . CNNs have also been proposed as a novel network intrusion detection model 30 .…”
Section: Related Workmentioning
confidence: 99%
“…The experiments part was conducted using KNN, XGBoost, SVM (RBF), SVM (linear), MLP, Decision Tree (DT), RF, Adaptive Boosting (AdaBoost), Naïve Bayes (NB). Also, Dahiya in Reference [38] introduces a model for identifying DDoS assaults where the overall derived features are processed and selected using the gain ratio technique. This paper uses a hybrid approach combining BiLSTM and an Optimized Deep Belief network (DBN) to detect DDoS threats.…”
Section: Limitations and Research Gapmentioning
confidence: 99%
“…Also, Dahiya in Reference [38] introduces a model for identifying DDoS assaults where the overall derived features are processed and selected using the gain ratio technique. This paper uses a hybrid approach combining BiLSTM and an Optimized Deep Belief network (DBN) to detect DDoS threats.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A DDoS attack is a significant menace for Internet-based systems, web services, devices (IoT and non-IoT), and traditional and modern types of networks, such as SDN. [5][6][7] The attackers send a massive amount of network traffic to the engaging resources of the victim. The impact of this type of attack can be victim networks or services down for a long time.…”
Section: A Ddos Attack Model and Vulnerable Points In Sdnmentioning
confidence: 99%