Skip to main content
Log in

Classification performance improvement by enhancing the detection accuracy of DDOS attacks over flash crowd using CROSS GAN (XGAN)

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to the rapid development of network technology in recent years, network security has drawn a lot of attention. Intrusion detection systems are crucial in preventing unwanted traffic from entering networks and computer systems. For network security, it is essential to increase the detection accuracy of network attacks using a range of strategies. However, to increase the detection accuracy of DDoS attacks, the existing model uses a Support vector machine (SVM) and K-Nearest Neighbors (KNN), which does not address the misclassification of data during transmission. Hence, a novel DDoS attack Over Flash Crowd Using Cross GAN (XGAN) has been proposed to classify the performance by enhancing the detection of DDoS attacks in the network which utilizes the information gain, chi-square, and gain ratio to determine the features first using a wrapper-based feature selection ensemble. There is no data collection available right now that has both flash crowd and DDoS sample data. To achieve more accurate categorizations using any classification model, a Generative Adversarial Network (GAN) technique is used to mimic both in the same data set. Then, a Cross Generative Adversarial Network (XGAN), a mixture of two sets of GANs that construct and classify even the imitation damaging attacks with high accuracy, has been provided to improve the detection performance of the model by minimizing the imbalance of attack records. Hence the proposed methodology enhanced the DDoS detection with high accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

Not Applicable.

Abbreviations

Pi :

Probability of class i

N:

Number of attribute values considered within the optimized value ranges

a:

Number of attack classes in the parent node

b:

Number of normal classes in the parent node

ac :

Number of attack classes in the child node

bc :

Number of normal classes in the child node

E(P):

The entropy of the parent node

E(C):

The entropy of the child node

G:

The generator

D:

The discriminator

Pdata(x):

The distribution of real data

P(z):

The distribution of generator

x:

The sample from Pdata(x)

z:

The sample from P(z)

D(x):

The discriminator network

G(z):

The generator network

TP:

True Positive Value

TN:

True Negative Value

FP:

False Positive Value

FN:

False Negative Value

References

  1. Agarwal A, Khari M, Singh R (2022) Detection of DDOS attack using deep learning model in cloud storage application. Wirel Pers Commun 127(1):419–439

    Article  Google Scholar 

  2. Chauhan R, Heydari SS (2020) Polymorphic adversarial DDoS attack on IDS using GAN. 2020 international symposium on networks, computers and communications (ISNCC). IEEE

  3. Chen JI, Zong, Smys S (2020) Social multimedia security and suspicious activity detection in SDN using hybrid deep learning technique. J Inform Technol 2(02):108–115

    Google Scholar 

  4. Chouhan N, Khan A (2019) Network anomaly detection using channel boosted and residual learning based deep convolutional neural network. Appl Soft Comput 83:105612

    Article  Google Scholar 

  5. Das S, Mahfouz AM, Venugopal D, Shiva S (2019) DDoS intrusion detection through machine learning ensemble. In: 2019 IEEE 19th international conference on software quality, reliability and security companion (QRS-C). IEEE, pp 471–477

  6. de Araujo-Filho PF et al (2020) Intrusion detection for cyber–physical- systems using generative adversarial networks in fog environment. IEEE Internet Things J 8(8):6247–6256

    Article  Google Scholar 

  7. Dixit P, Silakari S (2021) Deep learning algorithms for cybersecurity applications: a technological and status review. Comput Sci Rev 39:100317

    Article  MathSciNet  Google Scholar 

  8. Erhan L, Ndubuaku M, Di Mauro M, Song W, Chen M, Fortino G, Bagdasar O, Liotta A (2021) Smart anomaly detection in sensor systems: a multi-perspective review. Inf Fusion 67:64–79

    Article  Google Scholar 

  9. Frost, Carol M et al (2019) Using network theory to understand and predict biological invasions. Trends Ecol Evol 34(9):831–843

    Article  Google Scholar 

  10. Gurung S, Ghose MK, Subedi A (2019) Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int J Comput Netw Inform Secur 11(3):8–14

    Google Scholar 

  11. Haider S et al (2020) A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks. IEEE Access 8:53972–53983

    Article  Google Scholar 

  12. Hajj S et al (2021) Anomaly-based intrusion detection systems: the requirements, methods, measurements, and datasets. Trans Emerg Telecommun Technol 32(4):e4240

    Article  Google Scholar 

  13. Ibitoye O et al (2019) The threat of adversarial attacks on machine learning in network security–a survey. arXiv preprint arXiv:1911.02621

  14. Kirtas M, Passalis N, Kalavrouziotis D, Syrivelis D, Bakopoulos P, Pleros N, Tefas A (2022) Early detection of ddos attacks using photonic neural networks. In: 2022 IEEE 14th image, video, and multidimensional signal processing workshop (IVMSP) IEEE, pp 1–5

  15. Lee JH, Park KH (2021) GAN-based imbalanced data intrusion detection system. Personal Uniquit Comput 25(1):121–128

    Article  Google Scholar 

  16. Lin T (2020) Deep learning for IoT. 2020 IEEE 39th International performance computing and communications conference (IPCCC). IEEE

  17. Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: a survey. Appl Sci 9(20):4396

    Article  Google Scholar 

  18. Mazini M, Shirazi B, Mahdavi I (2019) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J King Saud Univ-Comput Inf Sci 31(4):541–553

    Google Scholar 

  19. Monteiro R, Bastos-Filho C (2020) Feature extraction using convolutional neural networks for anomaly detection, pp 1–8. https://doi.org/10.21528/CBIC2019-7

  20. Najafimehr M, Zarifzadeh S, Mostafavi S (2022) A hybrid machine learning approach for detecting unprecedented DDoS attacks. J Supercomput 78(6):8106–8136

    Article  Google Scholar 

  21. Nandakumar K et al (2019) Towards deep neural network training on encrypted data. Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops

  22. Rezvy S et al (2019) An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd annual conference on information sciences and systems (CISS). IEEE

  23. Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in IoT networks. 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE

  24. Sabry F, Eltaras T, Labda W, Alzoubi K, Malluhi Q (2022) Machine learning for healthcare wearable devices: the big picture. J Healthc Eng 2022:4653923. https://doi.org/10.1155/2022/4653923

  25. Sasikumar S (2021) Network intrusion detection and deduce system. Turkish J Comput Math Educ (TURCOMAT) 12(9):404–410

    Google Scholar 

  26. Sharafaldin I et al (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. 2019 International Carnahan Conference on Security Technology (ICCST). IEEE

  27. Staar B, Lütjen M, Freitag M (2019) Anomaly detection with convolutional neural networks for industrial surface inspection. Procedia CIRP 79:484–489

    Article  Google Scholar 

  28. Tan L, Pan Y, Wu J, Zhou J, Jiang H, Deng Y (2020) A new framework for DDoS attack detection and defense in SDN environment. IEEE Access 8:161908–161919

    Article  Google Scholar 

  29. Tang Y, Elhoseny M (2019) Computer network security evaluation simulation model based on neural network. J Intell Fuzzy Syst 37(3):3197–3204

    Article  Google Scholar 

  30. Ullah I, Qusay Mahmoud H (2021) Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9:103906–103926

    Article  Google Scholar 

  31. Usama M et al (2019) Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. 2019 15th international wireless communications & mobile computing conference (IWCMC). IEEE

  32. Vinayakumar R et al (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550

    Article  Google Scholar 

  33. Vu L, Nguyen QU, Nguyen DN, Hoang DT, Dutkiewicz E (2023) Deep Generative learning models for cloud intrusion detection systems. IEEE Trans Cybern 53(1):565–577. https://doi.org/10.1109/TCYB.2022.3163811

  34. Yan X et al (2019) A method of information protection for collaborative deep learning under gan model attack. IEEE/ACM Trans Comput Biol Bioinform

  35. Yu Y, Long J, Cai Z (2017) Session-based network intrusion detection using a deep learning architecture. In: International conference on modeling decisions for artificial intelligence. Springer, Cham pp 144–155

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C H Sekhar.

Ethics declarations

Conflict of interest

There is no conflict of interest available for this manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sekhar, C.H., Rao, K.V. & Prasad, M.H.M.K. Classification performance improvement by enhancing the detection accuracy of DDOS attacks over flash crowd using CROSS GAN (XGAN). Multimed Tools Appl 82, 38693–38714 (2023). https://doi.org/10.1007/s11042-023-15151-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15151-0

Keywords

Navigation