2021
DOI: 10.3934/mbe.2022059
|View full text |Cite
|
Sign up to set email alerts
|

IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks

Abstract: <abstract><p>Network security has become considerably essential because of the expansion of internet of things (IoT) devices. One of the greatest hazards of today's networks is distributed denial of service (DDoS) attacks, which could destroy critical network services. Recent numerous IoT devices are unsuspectingly attacked by DDoS. To securely manage IoT equipment, researchers have introduced software-defined networks (SDN). Therefore, we propose a DDoS attack detection scheme to secure the real-t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…Previous findings suggest that the basic FA exhibits relatively efficient exploitation, while its exploration abilities can be improved [56][57][58]. Notwithstanding that many successful implementations of enhanced/hybridized FA's version can be found in the modern literature [31,59], space for its improvements still exists. This stems from the fact that the FA's search equation, which conducts efficient intensification, can be effectively combined with novel mechanisms, as well as with procedures from other metaheuristics, in a wide variety of ways, and the practical potential for improvements is unlimited.…”
Section: Motivation and Proposed Improved Group Search Firefly Algorithmmentioning
confidence: 99%
“…Previous findings suggest that the basic FA exhibits relatively efficient exploitation, while its exploration abilities can be improved [56][57][58]. Notwithstanding that many successful implementations of enhanced/hybridized FA's version can be found in the modern literature [31,59], space for its improvements still exists. This stems from the fact that the FA's search equation, which conducts efficient intensification, can be effectively combined with novel mechanisms, as well as with procedures from other metaheuristics, in a wide variety of ways, and the practical potential for improvements is unlimited.…”
Section: Motivation and Proposed Improved Group Search Firefly Algorithmmentioning
confidence: 99%
“…They used an updated firefly method to find DDoS attacks to enhance the convolutional neural network (CNN). The findings showed that the proposed technique could detect innocuous traffic and DDoS activities with more than 99 percent [4]. Depending on the information entropy and deep learning, Liu et al suggested a two-level DDoS attack detection approach.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Amplification attacks, such as DNS reflection amplification attacks, can also be performed via reflection. Protocol vulnerabilities are commonly used in system resource attacks to use the victim's host resources (TCP-SYN half-connection attack employing TCP three-way handshake, for example [4]).…”
Section: Introductionmentioning
confidence: 99%
“…According to the recent research, the original FA implementation demonstrates very efficient exploitation, but the exploration could be enhanced as the algorithm can converge prematurely in some runs (Bacanin, Bezdan, Venkatachalam, and Al‐Turjman, 2021; Bezdan, Cvetnic, et al, 2021; Wang et al, 2017). Although there are numerous modified and enhanced variations of the FA's basic algorithm in the recent literature (Bacanin, Zivkovic, Bezdan, et al, 2022; Wang et al, 2022), there is still plenty of space for new improvements. Therefore, research reported in this manuscript proposes FA version that has been enhanced with a mechanism that ensures better diversification of solutions during the algorithm's run.…”
Section: Introductionmentioning
confidence: 99%