Classification of DDoS traffic for Industrial Internet of Services using Deep learning approaches DOI

Ghazia Qaiser,

Sivachandran Chandrasekaran, Rifai Chai

et al.

Published: Sept. 16, 2023

The Industrial Internet of Services (IIoS) combines traditional industrial systems with digital technologies, offering numerous advantages like improved efficiency, productivity, and resource optimization. However, the rapid growth IIoS introduces significant cybersecurity risks. Cyber threats including DDoS attacks, unauthorized access, data breaches, malware infections, pose a severe risk to security. Among these threats, attacks have become concern. overwhelm networks excessive traffic, preventing legitimate users from accessing network. Such can disrupt systems, causing downtime inaccessible services.This study aims analyze that target explore effectiveness deep learning algorithms in detecting DDoS. This research analyzes performance four algorithms, ultimately finding DNN GRU models achieved remarkably high accuracy rates 99%. enhance ability identify potential Distributed Denial Service (DDoS) leading operational security optimized production processes. By employing findings this research, effectively detect hazards, resulting enhanced productivity streamlined processes within environment.

Language: Английский

Parrot optimization algorithm for improved multi-strategy fusion for feature optimization of data in medical and industrial field DOI

Gaoxia Huang,

Jianan Wei,

Yage Yuan

et al.

Swarm and Evolutionary Computation, Journal Year: 2025, Volume and Issue: 95, P. 101908 - 101908

Published: March 18, 2025

Language: Английский

Citations

0

Swarm-based Cost-sensitive Decision Tree Using Optimized Rules for Imbalanced Data Classification DOI

Mehdi Mansouri,

Mohammad H. Nadimi-Shahraki, Zahra Beheshti

et al.

Journal of Bionic Engineering, Journal Year: 2025, Volume and Issue: unknown

Published: April 4, 2025

Language: Английский

Citations

0

A multi-strategy improved electric eel foraging optimization algorithm: continuous and binary variants for solving optimization problems DOI
Reham R. Mostafa,

Ahmed M. Khedr,

Zaher Al Aghbari

et al.

International Journal of Machine Learning and Cybernetics, Journal Year: 2025, Volume and Issue: unknown

Published: April 10, 2025

Language: Английский

Citations

0

Stochastic fractal equilibrium optimizer with X-shaped dynamic transfer function for solving large-scale feature selection problems DOI
Yuliang Qi, Yuwei Song, Jie-Sheng Wang

et al.

Knowledge-Based Systems, Journal Year: 2025, Volume and Issue: 318, P. 113567 - 113567

Published: April 18, 2025

Language: Английский

Citations

0

Feature Selection with an Improved Flow Direction Algorithm to Improve the Performance of Intrusion Detection Systems DOI

F. Ghahramani,

Farhad Soleimanian Gharehchopogh

Annals of Data Science, Journal Year: 2025, Volume and Issue: unknown

Published: April 28, 2025

Language: Английский

Citations

0

A hybrid Ant Lion Optimization algorithm based lightweight deep learning framework for cyber attack detection in IoT environment DOI
Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar

et al.

Computers & Electrical Engineering, Journal Year: 2024, Volume and Issue: 122, P. 109944 - 109944

Published: Dec. 10, 2024

Language: Английский

Citations

3

Robust DDoS Attack Detection Using Piecewise Harris Hawks Optimizer with Deep Learning for a Secure Internet of Things Environment DOI Creative Commons
Mahmoud Ragab, Sultanah M. Alshammari, Louai A. Maghrabi

et al.

Mathematics, Journal Year: 2023, Volume and Issue: 11(21), P. 4448 - 4448

Published: Oct. 27, 2023

The Internet of Things (IoT) refers to the network interconnected physical devices that are embedded with software, sensors, etc., allowing them exchange and collect information. Although IoT have several advantages can improve people’s efficacy, they also pose a security risk. malicious actor frequently attempts find new way utilize exploit specific resources, an device is ideal candidate for such exploitation owing massive number active devices. Especially, Distributed Denial Service (DDoS) attacks include considerable like devices, which act as bots transfer fraudulent requests services, thereby obstructing them. There needs be robust system detection based on satisfactory methods detecting identifying whether these occurred or not in network. most widely used technique purposes artificial intelligence (AI), includes usage Deep Learning (DL) Machine (ML) cyberattacks. study presents Piecewise Harris Hawks Optimizer Optimal Classifier (PHHO-ODLC) secure environment. fundamental goal PHHO-ODLC algorithm detect existence DDoS platform. method follows three-stage process. At initial stage, PHHO employed choose relevant features enhance classification performance. Next, attention-based bidirectional long short-term memory (ABiLSTM) applied attack Finally, hyperparameter selection ABiLSTM carried out by use grey wolf optimizer (GWO). A widespread simulation analysis was performed exhibit improved accuracy technique. extensive outcomes demonstrated significance regarding

Language: Английский

Citations

6

Empowering African vultures optimizer using Archimedes optimization algorithm for maximum efficiency for global optimization and feature selection DOI
Reham R. Mostafa, Fatma A. Hashim, Noha E. El-Attar

et al.

Evolving Systems, Journal Year: 2024, Volume and Issue: 15(5), P. 1701 - 1731

Published: May 10, 2024

Language: Английский

Citations

1

Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection DOI
Yuan Li,

Xiongjun Tian,

Jiacheng Yuan

et al.

Cluster Computing, Journal Year: 2024, Volume and Issue: unknown

Published: June 15, 2024

Language: Английский

Citations

1

BYDSEX: Binary Young's Double-Slit Experiment Optimizer with Adaptive Crossover for Feature Selection: Investigating Performance Issues of Network Intrusion Detection DOI
Doaa El-Shahat, Mohamed Abdel‐Basset, Nourhan Talal

et al.

Knowledge-Based Systems, Journal Year: 2024, Volume and Issue: 305, P. 112589 - 112589

Published: Oct. 6, 2024

Language: Английский

Citations

1