International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

DDoS Attack Detection in Cloud Computing Using Optimized Elman Neural Network Based on Bacterial Colony Optimization and Centroid Opposition-Based Learning

Author NameAuthor Details

S. Kalvikkarasi, A. Saraswathi

S. Kalvikkarasi[1]

A. Saraswathi[2]

[1]PG and Research Department of Computer Science, Government Arts College (Autonomous) (Affiliated to Bharathidasan university, Trichy), Karur, Tamil Nadu, India.

[2]PG and Research Department of Computer Science, Government Arts College (Autonomous) (Affiliated to Bharathidasan university, Trichy), Karur, Tamil Nadu, India

Abstract

Cloud computing infrastructures are particularly vulnerable to Distributed Denial of Service (DDoS) attacks due to the large-scale and dynamic nature of resources. Large data volumes are handled by cloud settings, which raises the computational cost of detection, and filtering malicious traffic from genuine traffic in such large quantities is difficult. The conventional detection techniques are insufficient. The optimized Elman Neural Network (ENN) used in this study's proposed enhanced DDoS attack detection framework combines centroid opposition-based learning (COBL) with bacterial colony optimization (BCO) called COBCO. The conventional BCO lacks population diversity and can fall into local optima due to random initialization and population update. To overcome the above issues, COBL is used for population initialization and population update to enhance population diversity and avoid local optima issues. By imitating bacterial foraging behavior, the COBCO algorithm improves the ENN's capacity to explore and exploit the solution space, increasing the network's speed of convergence and accuracy of detection. Meanwhile, COBL enhances the learning process by producing a wider range of solid candidate solutions, which offset the drawbacks of conventional opposition-based learning. Extensive simulations show that the suggested strategy outperforms traditional techniques in identifying different kinds of DDoS attacks.

Index Terms

Elman Neural Network

Bacterial Colony Optimization

Centroid Opposition-Based Learning

Hyperparameter Optimization

Convergence Rate

DDoS Attack Detection

Reference

  1. 1.
    M. Alam, M. Shahid, and S. Mustajab, "Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions," The Journal of Supercomputing, pp. 1-65, 2024.
  2. 2.
    D. N, J. Katiravan, and S. S.P, "Botnet Attack Detection in IoT Devices using Ensemble Classifiers with Reduced Feature Space," International Research Journal of Multidisciplinary Technovation, vol. 6, no. 3, pp. 274-295, 05/22 2024, doi: 10.54392/irjmt24321.
  3. 3.
    S. K. V, M. K. V, C. N. Azmea, and K. K. Vaigandla, "BCSDNCC: A Secure Blockchain SDN framework for IoT and Cloud Computing," International Research Journal of Multidisciplinary Technovation, vol. 6, no. 3, pp. 26-44, 04/16 2024, doi: 10.54392/irjmt2433.
  4. 4.
    P. Ravi Kiran Varma, S. RR, and M. Vanitha, "Enhanced Elman spike neural network based intrusion attack detection in software defined Internet of Things network," Concurrency and Computation: Practice and Experience, vol. 35, no. 2, p. e7503, 2023.
  5. 5.
    M. T. Hussan, G. V. Reddy, P. Anitha, A. Kanagaraj, and P. Naresh, "DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization," Cluster Computing, pp. 1-22, 2023.
  6. 6.
    B. Sivasakthi and D. Selvanayagi, "Prediction of osteoporosis disease using enhanced Elman recurrent neural network with bacterial colony optimization," in Computational Vision and Bio-Inspired Computing: Proceedings of ICCVBIC 2022: Springer, 2023, pp. 211-220.
  7. 7.
    R. Priyadarshini and R. K. Barik, "A deep learning based intelligent framework to mitigate DDoS attack in fog environment," Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 3, pp. 825-831, 2022.
  8. 8.
    A. V. Kachavimath and D. Narayan, "A deep learning-based framework for distributed denial-of-service attacks detection in cloud environment," in Advances in Computing and Network Communications: Proceedings of CoCoNet 2020, Volume 1, 2021: Springer, pp. 605-618.
  9. 9.
    Y. Sanjalawe and T. Althobaiti, "DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning," Computers, Materials & Continua, vol. 75, no. 2, 2023.
  10. 10.
    T. Khempetch and P. Wuttidittachotti, "DDoS attack detection using deep learning," IAES International Journal of Artificial Intelligence, vol. 10, no. 2, p. 382, 2021.
  11. 11.
    D. Kumar, R. Pateriya, R. K. Gupta, V. Dehalwar, and A. Sharma, "DDoS detection using deep learning," Procedia Computer Science, vol. 218, pp. 2420-2429, 2023.
  12. 12.
    S. Potluri, M. Mangla, S. Satpathy, and S. N. Mohanty, "Detection and prevention mechanisms for DDoS attack in cloud computing environment," in 2020 11th international conference on computing, communication and networking technologies (ICCCNT), 2020: IEEE, pp. 1-6.
  13. 13.
    A. Agarwal, M. Khari, and R. Singh, "Detection of DDOS attack using deep learning model in cloud storage application," Wireless Personal Communications, pp. 1-21, 2022.
  14. 14.
    A. E. Cil, K. Yildiz, and A. Buldu, "Detection of DDoS attacks with feed forward based deep neural network model," Expert Systems with Applications, vol. 169, p. 114520, 2021.
  15. 15.
    S. Velliangiri, P. Karthikeyan, and V. Vinoth Kumar, "Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks," Journal of Experimental & Theoretical Artificial Intelligence, vol. 33, no. 3, pp. 405-424, 2021.
  16. 16.
    A. Amjad, T. Alyas, U. Farooq, and M. A. Tariq, "Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm," EAI Endorsed Transactions on Scalable Information Systems, vol. 6, no. 23, pp. e7-e7, 2019.
  17. 17.
    S. Ur Rehman et al., "DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)," Future Generation Computer Systems, vol. 118, pp. 453-466, 2021.
  18. 18.
    D. Alghazzawi, O. Bamasag, H. Ullah, and M. Z. Asghar, "Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection," Applied Sciences, vol. 11, no. 24, p. 11634, 2021.
  19. 19.
    A. V. Songa and G. R. Karri, "Ensemble-RNN: A Robust Framework for DDoS Detection in Cloud Environment," Majlesi Journal of Electrical Engineering, vol. 17, no. 4, pp. 31-44, 2023.
  20. 20.
    S. Balasubramaniam et al., "Optimization enabled deep learning-based DDoS attack detection in cloud computing," International Journal of Intelligent Systems, vol. 2023, 2023.
  21. 21.
    G. S. Kushwah and V. Ranga, "Optimized extreme learning machine for detecting DDoS attacks in cloud computing," Computers & Security, vol. 105, p. 102260, 2021.
  22. 22.
    P. T. Dinh and M. Park, "R-EDoS: robust economic denial of sustainability detection in an SDN-based cloud through stochastic recurrent neural network," IEEE Access, vol. 9, pp. 35057-35074, 2021.
  23. 23.
    S. Sumathi, R. Rajesh, and S. Lim, "Recurrent and deep learning neural network models for DDoS attack detection," Journal of Sensors, vol. 2022, 2022.
  24. 24.
    J. L. Elman, "Finding structure in time," Cognitive science, vol. 14, no. 2, pp. 179-211, 1990.
  25. 25.
    B. Niu and H. Wang, "Bacterial colony optimization: principles and foundations," in Emerging Intelligent Computing Technology and Applications: 8th International Conference, ICIC 2012, Huangshan, China, July 25-29, 2012. Proceedings 8, 2012: Springer, pp. 501-506.
  26. 26.
    K. Vijayakumari and V. Baby Deepa, "Fuzzy C-means hybrid with fuzzy bacterial colony optimization," in Advances in electrical and computer technologies: select proceedings of ICAECT 2020, 2021: Springer, pp. 75-87.
  27. 27.
    V. Prakash, V. Vinothina, K. Kalaiselvi, and K. Velusamy, "An improved bacterial colony optimization using opposition-based learning for data clustering," Cluster Computing, vol. 25, no. 6, pp. 4009-4025, 2022.
  28. 28.
    J. Revathi, V. Eswaramurthy, and P. Padmavathi, "Bacterial colony optimization for data clustering," in 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2019: IEEE, pp. 1-4.
  29. 29.
    J. Revathi, V. Eswaramurthy, and P. Padmavathi, "Hybrid data clustering approaches using bacterial colony optimization and k-means," in IOP Conference Series: Materials Science and Engineering, 2021, vol. 1070, no. 1: IOP Publishing, p. 012064.
  30. 30.
    K. Tamilarisi, M. Gogulkumar, and K. Velusamy, "Data clustering using bacterial colony optimization with particle swarm optimization," in 2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2021: IEEE, pp. 1-5.
  31. 31.
    S. S. Babu and K. Jayasudha, "A simplex method-based bacterial colony optimization for data clustering," in Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2021: Springer, 2022, pp. 987-995.
  32. 32.
    S. S. Babu and K. Jayasudha, "A simplex method-based bacterial colony optimization algorithm for data clustering analysis," International Journal of Pattern Recognition and Artificial Intelligence, vol. 36, no. 12, p. 2259027, 2022.
  33. 33.
    H. Wang, L. Tan, and B. Niu, "Feature selection for classification of microarray gene expression cancers using Bacterial Colony Optimization with multi-dimensional population," Swarm and Evolutionary Computation, vol. 48, pp. 172-181, 2019.
  34. 34.
    S. ?lkin, T. H. Gençtürk, F. K. Güla??z, H. Özcan, M. A. Altuncu, and S. ?ahin, "hybSVM: Bacterial colony optimization algorithm based SVM for malignant melanoma detection," Engineering Science and Technology, an International Journal, vol. 24, no. 5, pp. 1059-1071, 2021.
  35. 35.
    B. Niu, T. Xie, Y. Bi, and J. Liu, "Bacterial colony optimization for integrated yard truck scheduling and storage allocation problem," in Intelligent Computing in Bioinformatics: 10th International Conference, ICIC 2014, Taiyuan, China, August 3-6, 2014. Proceedings 10, 2014: Springer, pp. 431-437.
  36. 36.
    H. R. Tizhoosh, "Opposition-based learning: a new scheme for machine intelligence," in International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), 2005, vol. 1: IEEE, pp. 695-701.
  37. 37.
    S. Rahnamayan, J. Jesuthasan, F. Bourennani, H. Salehinejad, and G. F. Naterer, "Computing opposition by involving entire population," in 2014 IEEE congress on evolutionary computation (CEC), 2014: IEEE, pp. 1800-1807.
  38. 38.
    R. S. Parpinelli, G. F. Plichoski, R. S. D. Silva, and P. H. Narloch, "A review of techniques for online control of parameters in swarm intelligence and evolutionary computation algorithms," International Journal of Bio-Inspired Computation, vol. 13, no. 1, pp. 1-20, 2019.
  39. 39.
    L. Yang, F. Wang, J. Zhang, and W. Ren, "Remaining useful life prediction of ultrasonic motor based on Elman neural network with improved particle swarm optimization," Measurement, vol. 143, pp. 27-38, 2019.
  40. 40.
    Y. Wang, L. Wang, F. Yang, W. Di, and Q. Chang, "Advantages of direct input-to-output connections in neural networks: The Elman network for stock index forecasting," Information Sciences, vol. 547, pp. 1066-1079, 2021.
  41. 41.
    A. Sadeghi-Niaraki, P. Mirshafiei, M. Shakeri, and S.-M. Choi, "Short-term traffic flow prediction using the modified elman recurrent neural network optimized through a genetic algorithm," IEEE Access, vol. 8, pp. 217526-217540, 2020.
  42. 42.
    N. Chowdhury, "A comparative analysis of feed-forward neural network & recurrent neural network to detect intrusion," in 2008 International Conference on Electrical and Computer Engineering, 2008: IEEE, pp. 488-492.
  43. 43.
    Z. Chiba, N. Abghour, K. Moussaid, A. El Omri, and M. Rida, "A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection," Computers & Security, vol. 75, pp. 36-58, 2018.
  44. 44.
    T. A. Tuan, H. V. Long, L. H. Son, R. Kumar, I. Priyadarshini, and N. T. K. Son, "Performance evaluation of Botnet DDoS attack detection using machine learning," Evolutionary Intelligence, vol. 13, no. 2, pp. 283-294, 2020.
  45. 45.
    N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), 10-12 Nov. 2015 2015, pp. 1-6, doi: 10.1109/MilCIS.2015.7348942.
  46. 46.
    I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, "Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy," in 2019 international carnahan conference on security technology (ICCST), 2019: IEEE, pp. 1-8.
  47. 47.
    A. Likas, N. Vlassis, and J. J. Verbeek, "The global k-means clustering algorithm," Pattern recognition, vol. 36, no. 2, pp. 451-461, 2003.
  48. 48.
    P. Shelokar, V. K. Jayaraman, and B. D. Kulkarni, "An ant colony approach for clustering," Analytica Chimica Acta, vol. 509, no. 2, pp. 187-195, 2004.
  49. 49.
    I. De Falco, A. Della Cioppa, and E. Tarantino, "Facing classification problems with particle swarm optimization," Applied Soft Computing, vol. 7, no. 3, pp. 652-658, 2007.
  50. 50.
    M. Wan, L. Li, J. Xiao, C. Wang, and Y. Yang, "Data clustering using bacterial foraging optimization," Journal of Intelligent Information Systems, vol. 38, no. 2, pp. 321-341, 2012.
SCOPUS
SCImago Journal & Country Rank