Skip to main content

Advertisement

Log in

Optimal feature selection with CNN-feature learning for DDoS attack detection using meta-heuristic-based LSTM

  • Regular Paper
  • Published:
International Journal of Intelligent Robotics and Applications Aims and scope Submit manuscript

Abstract

Nowadays, the digital era is reshaped by new technologies, and the cyber-attacks are more sophisticated and becoming as a commonplace. The distributed denial of service (DDoS) attacks are the exponentially-growing and major prevalent attack that targets the emerging and changing computational network infrastructures around the globe. It is complex to distinguish the DDoS attack traffic from the legitimate network traffic when the transit happens from the zombies or attacker to the victim. The DDoS attack is considered as a stubborn network security conflict. Yet, these algorithms need a priori knowledge regarding the classes, and it is not possible to adapt to the subsequent varying network traffic trends in an automatic manner. This creates the requirement for the enhancement of the novel DDoS detection mechanisms that in turn sophisticated and targets the DDoS attacks. The main intent of this paper is to implement the DDoS detection model through deep learning by the integration of convolutional neural network (CNN), and optimized long short-term memory (LSTM), so called CNN-O-LSTM. On the standard five benchmark datasets, the optimal feature selection is performed by the closest position-based grey wolf optimization (CP-GWO) with the consideration of minimizing the correlation among the features. With the optimally selected features, CNN is adopted for the feature learning process, from which the features of the second pooling layer are extracted, which is used for performing the detection. The adoption of optimally selected features with the CNN features enhances the detection performance with the most significant features. Finally, the optimized LSTM is used in the detection phase, which aims to maximize the detection accuracy by optimizing the hidden neurons of LSTM. The proposed DDoS detection scheme is experimented on a set of benchmark datasets, and the outcomes are compared over the traditional models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  • Abbasi, M.U., Rashad, A., Basalamah, A., Tariq, M.: Detection of epilepsy seizures in neo-natal EEG using LSTM architecture. IEEE Access 7, 179074–179085 (2019)

    Article  Google Scholar 

  • Ahmad, I., Namal, S., Ylianttila, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317–2346 (2015)

    Article  Google Scholar 

  • Arun Raj Kumar, P., Selvakumar, S.: Distributed denial of service attack detection using an ensemble of neural classifier. Comput. Commun. 34(11), 1328–1341 (2011)

    Article  Google Scholar 

  • Bhuyan, M.H., Kashyap, H.J., Bhattacharyya, D.K., Kalita, J.K.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. 57(4), 537–556 (2014)

    Article  Google Scholar 

  • Bojović, P.D., Bašičević, I., Ocovaj, S., Popović, M.: A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method. Comput. Electr. Eng. 73, 84–96 (2019)

    Article  Google Scholar 

  • Çakmakçı, S.D., Kemmerich, T., Ahmed, T., Baykal, N.: Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm. J. Netw. Comput. Appl. 168, 102756 (2020)

    Article  Google Scholar 

  • Chaithanya, P.S., Gauthama Raman, M.R., Nivethitha, S., Seshan, K.S., Shankar Sriram, V.: An efficient intrusion detection approach using enhanced random forest and moth-flame optimization technique. In: Computational Intelligence in Pattern Recognition, vol. 999, pp. 877–884 (2020)

  • Chen, Y., Hwang, K., Ku, W.: Collaborative detection of DDoS attacks over multiple network domains. IEEE Trans. Parallel Distrib. Syst. 18(12), 1649–1662 (2007a)

    Article  Google Scholar 

  • Chen, Z., Chen, Z., Delis, A.: An inline detection and prevention framework for distributed denial of service attacks. Comput. J. 50(1), 7–40 (2007b)

    Article  Google Scholar 

  • Chen, C.-Y., Chen, L.-A., Cai, Y.-Z., Tsai, M.-H.: RNN-based DDoS detection in IoT scenario. In: 2020 International computer symposium (ICS), pp. 448–453 (2020)

  • Chonka, A., Singh, J., Zhou, W.: Chaos theory based detection against network mimicking DDoS attacks. IEEE Commun. Lett. 13(9), 717–719 (2009)

    Article  Google Scholar 

  • Gao, Y., Wu, H., Song, B., Jin, Y., Luo, X., Zeng, X.: A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7, 154560–154571 (2019)

    Article  Google Scholar 

  • Haider, S., et al.: A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks. IEEE Access 8, 53972–53983 (2020)

    Article  Google Scholar 

  • Hamed, H., Al-Shaer, E.: Taxonomy of conflicts in network security policies. Commun. Mag. IEEE 44(3), 134–141 (2006)

    Article  Google Scholar 

  • Jiang, Y., Chen, W., Liu, M., Wang, Y., Meijering, E.: 3D neuron microscopy image segmentation via the ray-shooting model and a DC-BLSTM network. IEEE Trans. Med. Imaging 40(1), 26–37 (2021)

    Article  Google Scholar 

  • Jing, Z.H.U., Zhongdong, W.U., Longbin, D.I.N.G., Yang, W.A.N.G.: DDoS attack detection based on DBN in SDN environment. Comput. Eng. 46(4), 157–161 (2020)

    Google Scholar 

  • Kasim, Ö.: An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks. Comput. Netw. 180, 107390 (2020)

    Article  Google Scholar 

  • Kushwah, G.S., Ranga, V.: Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J. Inf. Secur. Appl. 53, 102532 (2020)

    Google Scholar 

  • Li, J., Liu, Y., Gu, L.: DDoS attack detection based on neural network. In: 2010 2nd international symposium on aware computing, pp. 196–199 (2010)

  • Liu, Z., He, Y., Wang, W., Zhang, B.: DDoS attack detection scheme based on entropy and PSO-BP neural network in SDN. China Commun. 16(7), 144–155 (2019)

    Article  Google Scholar 

  • Makuvaza, A., Jat, D.S., Gamundani, A.M.: Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs). SN Comput. Sci. 2, 1–10 (2021)

    Article  Google Scholar 

  • Malipatil, S., Maheshwari, V., Chandra, M.B.: Area optimization of CMOS full adder design using 3T XOR. In: 2020 International conference on wireless communications signal processing and networking (WiSPNET), pp. 192–194 (2020)

  • Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46–61 (2014)

    Article  Google Scholar 

  • Namatēvs, I.: Deep convolutional neural networks: structure, feature extraction and training. Inf. Technol. Manag. Sci. 20, 40–47 (2017)

    Google Scholar 

  • Penmatsa, R.K.V., Subba Raju, K.V., Ruthala, S.: Application of whale optimization algorithm in DDOS attack detection and feature reduction. In: Inventive Computation and Information Technologies, vol. 173, pp. 93–102 (2021)

  • Ravi, N., Shalinie, S.M.: Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J. 7(4), 3559–3570 (2020)

    Article  Google Scholar 

  • Shin, S., Wang, H., Gu, G.: A first step toward network security virtualization: from concept to prototype. IEEE Trans. Inf. Forensics Secur. 10(10), 2236–2249 (2015)

    Article  Google Scholar 

  • Singh, K., Dhindsa, K.S., Nehra, D.: T-CAD: a threshold based collaborative DDoS attack detection in multiple autonomous systems. J. Inf. Secur. Appl. 51, 102457 (2020)

    Google Scholar 

  • Tabatabaie Nezhad, S.M., Nazari, M., Gharavol, E.A.: A novel DoS and DDoS attacks detection algorithm using ARIMA time series model and chaotic system in computer networks. IEEE Commun. Lett. 20(4), 700–703 (2016a)

    Article  Google Scholar 

  • Tabatabaie Nezhad, S.M., Nazari, M., Gharavol, E.A.: A novel DoS and DDoS attacks detection algorithm using ARIMA time series model and chaotic system in computer networks. IEEE Commun. Lett. 20(4), 700–703 (2016b)

    Article  Google Scholar 

  • Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R.P., Hu, J.: Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans. Comput. 64(9), 2519–2533 (2015)

    Article  MathSciNet  Google Scholar 

  • Tang, Y., Li, B., Liu, M., Chen, B., Wang, Y., Ouyang, W.: AutoPedestrian: an automatic data augmentation and loss function search scheme for pedestrian detection. IEEE Trans. Image Process. 30, 8483–8496 (2021)

    Article  MathSciNet  Google Scholar 

  • Tuan, T.A., Long, H.V., Son, L.H., Kumar, R., Priyadarshini, I., Kim Son, N.T.: Performance evaluation of Botnet DDoS attack detection using machine learning. Evol. Intell. 13, 283–294 (2020)

    Article  Google Scholar 

  • Velliangiri, S., Pandey, H.M.: Fuzzy-Taylor-elephant herd optimization inspired deep belief network for DDoS attack detection and comparison with state-of-the-arts algorithms. Futur. Gener. Comput. Syst. 110, 80–90 (2020)

    Article  Google Scholar 

  • Wang, M., Lu, Y., Qin, J.: A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput. Secur. 88, 101645 (2020)

    Article  Google Scholar 

  • Wool, A.: A quantitative study of firewall configuration errors. Computer 37(6), 62–67 (2004)

    Article  Google Scholar 

  • Yu, J., Lee, E., Oh, S., Seo, Y., Kim, Y.: A survey on security requirements for WSNs: focusing on the characteristics related to security. IEEE Access 8, 45304–45324 (2020)

    Article  Google Scholar 

  • Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)

    Article  Google Scholar 

  • Zeng, K., Wang, Y., Mao, J., Liu, J., Peng, W., Chen, N.: A local metric for defocus blur detection based on CNN feature learning. IEEE Trans. Image Process. 28(5), 2107–2115 (2019)

    Article  MathSciNet  Google Scholar 

  • Zhang, C., Luo, F., Ranzi, G.: An advanced persistent distributed denial-of-service attack model with reverse-path forwarding-based defending strategy. IEEE Access 7, 185590–185596 (2019)

    Article  Google Scholar 

  • Zhou, Z., Gaurav, A., Gupta, B.B., Lytras, M.D., Razzak, I.: A fine-grained access control and security approach for intelligent vehicular transport in 6G communication system. In: IEEE transactions on intelligent transportation systems, pp. 1–10 (2021)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Raghava Swamy Dora.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dora, V.R.S., Lakshmi, V.N. Optimal feature selection with CNN-feature learning for DDoS attack detection using meta-heuristic-based LSTM. Int J Intell Robot Appl 6, 323–349 (2022). https://doi.org/10.1007/s41315-022-00224-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41315-022-00224-4

Keywords

Navigation