Improved Whale Optimization Algorithm and Optimized Long Short-Term Memory for DDoS Cyber Security Threat DOI

Sanjaikanth E Vadakkethil,

Kiran Polimetla,

Srikanth Velpula

et al.

Published: April 26, 2024

The Distributed Denial of Service (DDoS) attacks is a critical cyber security threat that blocks the services for users and leads to important damage reputation effective customers. existing methods provides low classification accuracy due irrelevant features in performance. Improved Whale Optimization Algorithm (IWOA) proposed selecting relevant which improved selected are detected classified by Optimized Long Short-Term Memory (OLSTM) provided high detection rate DDoS attacks. one-hot encoding min-max normalization techniques used data pre-processing stage improve performance classification. CIC-DDoS 2019 dataset evaluating method. IWOA-OLSTM method attained highest 97.12%, precision 96.74%, recall 96.27%. f1-score 96.54% DR 93.26% on than Convolutional Neural Network (CNN) - Bidirectional (BiLSTM) CNN-LSTM.

Language: Английский

Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security DOI

P. Subbulakshmi,

Raushan Kumar,

L Pavithra

et al.

Cluster Computing, Journal Year: 2025, Volume and Issue: 28(3)

Published: Jan. 28, 2025

Language: Английский

Citations

3

A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications DOI Creative Commons

Nathalie Tan Yhe Huan,

Zuriati Ahmad Zukarnain

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 69765 - 69782

Published: Jan. 1, 2024

By 2025, the Internet of Things (IoT) infrastructure is projected to encompass over 75 billion devices, facilitated by increasing proliferation intelligent applications. The ecosystem consists sensors that function as data generators and applications necessitate financial transactions compensate producers. Security a highly important concern. Employing blockchain technology makes it feasible enhance security maintaining payments in ledger not just secure but also translucent, distributed, immutable. This article provides an introductory overview subsequently delves into many threats vulnerabilities arising within IoT framework. study provided blockchain, focusing on its categorization properties. Moreover, this examines necessity combining with (IoT), addition reviewing relevant literature studies conducted other scholars. offers insight uses (IoT).

Language: Английский

Citations

10

Overview on Intrusion Detection Systems for Computers Networking Security DOI Creative Commons
Lorenzo Diana, Pierpaolo Dini,

Davide Paolini

et al.

Computers, Journal Year: 2025, Volume and Issue: 14(3), P. 87 - 87

Published: March 3, 2025

The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. However, this increased connectivity has also expanded the attack surface, introducing significant security risks. This paper provides a comprehensive review Intrusion Detection System (IDS) technologies for network security, examining both traditional methods recent advancements. covers IDS architectures types, key detection techniques, datasets test environments, implementations in modern environments such as cloud computing, virtualized networks, Internet Things (IoT), industrial control systems. It addresses current challenges, including scalability, performance, reduction false positives negatives. Special attention is given integration advanced like Artificial Intelligence (AI) Machine Learning (ML), potential distributed blockchain. By maintaining broad-spectrum analysis, aims offer holistic view state-of-the-art IDSs, support diverse audience, identify future research development directions critical area cybersecurity.

Language: Английский

Citations

1

Detecting Cyber Threats With a Graph-Based NIDPS DOI

Brendan Ooi Tze Wen,

Najihah Syahriza,

Nicholas Chan Wei Xian

et al.

Advances in logistics, operations, and management science book series, Journal Year: 2023, Volume and Issue: unknown, P. 36 - 74

Published: Dec. 29, 2023

This chapter explores the topic of a novel network-based intrusion detection system (NIDPS) that utilises concept graph theory to detect and prevent incoming threats. With technology progressing at rapid rate, number cyber threats will also increase accordingly. Thus, demand for better network security through NIDPS is needed protect data contained in networks. The primary objective this explore based four different aspects: collection, analysis engine, preventive action, reporting. Besides analysing existing NIDS technologies market, various research papers journals were explored. authors' solution covers basic structure an system, from collecting processing generating alerts reports. Data collection methods like packet-based, flow-based, log-based collections terms scale viability.

Language: Английский

Citations

22

Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit DOI
Md. Mobin Akhtar, Sultan Alasmari,

S. K. Wasim Haidar

et al.

Peer-to-Peer Networking and Applications, Journal Year: 2025, Volume and Issue: 18(2)

Published: Jan. 28, 2025

Language: Английский

Citations

0

Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach DOI Creative Commons

Noor Ul Ain,

Muhammad Sardaraz, Muhammad Tahir

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(5), P. 1346 - 1346

Published: Feb. 22, 2025

The Internet of Things (IoT) has revolutionized many domains. Due to the growing interconnectivity IoT networks, several security challenges persist that need be addressed. This research presents application deep learning techniques for Distributed Denial-of-Service (DDoS) attack detection in networks. study assesses performance various models, including Latent Autoencoders, LSTM and convolutional neural networks (CNNs), DDoS environments. Furthermore, a novel hybrid model is proposed, integrating CNNs feature extraction, Long Short-Term Memory (LSTM) temporal pattern recognition, Autoencoders dimensionality reduction. Experimental results on CICIOT2023 dataset show enhanced proposed model, achieving training testing accuracy 96.78% integrated with 96.60% validation accuracy. its efficiency addressing complex patterns within Results’ analysis shows outperforms others. However, this limitations detecting rare types emphasizes importance data imbalance further enhancement capabilities future.

Language: Английский

Citations

0

Enhanced autoencoder and deep neural network (AE&DNN) method for ddos attack recognition DOI
P. J. Beslin Pajila,

Y. Harold Robinson,

Udayakumar Allimuthu

et al.

Wireless Networks, Journal Year: 2025, Volume and Issue: unknown

Published: March 15, 2025

Language: Английский

Citations

0

Attack Detection System for Cloud-Based Wireless Sensor Networks Using the Proposed Fast Hyper Deep Learning Model DOI

Hadeel M. Saleh,

Hend Marouane,

Ahmed Fakhfakh

et al.

Lecture notes in electrical engineering, Journal Year: 2025, Volume and Issue: unknown, P. 900 - 916

Published: Jan. 1, 2025

Language: Английский

Citations

0

Cyberattack Detection and Mitigation on Central Volt‐VAr Using Circuit Law and Machine Learning DOI Creative Commons
Milad Beikbabaei, Ali Mehrizi‐Sani, Chen‐Ching Liu

et al.

The Journal of Engineering, Journal Year: 2025, Volume and Issue: 2025(1)

Published: Jan. 1, 2025

ABSTRACT In a distribution grid, voltage is maintained within nominal range through Volt‐VAr function that controls capacitor banks, reactive power of distributed energy resources (DER), and on‐load tap changers (OLTC). Availability communications helps with the implementation central control; however, it also opens system to cyberattacks, causing disturbances. Previous work has shown adverse impacts false data injection (FDI) on very few works have studied methods detect mitigate FDI control. This paper addresses gaps in detection mitigation measurement packets uses two‐stage algorithm for cyberattack since accuracy single‐stage machine learning (ML)–based method decreases while dealing unseen data. The first stage based verification measurements against circuit laws, second utilizes tree search an ML falsified compares long short‐term memory (LSTM) bidirectional LSTM (BiLSTM) as employed algorithms. Finally, replaces estimated output algorithm. effectiveness proposed tested several cases using IEEE 13‐bus test PSCAD software.

Language: Английский

Citations

0

Challenges in detecting security threats in WoT: a systematic literature review DOI Creative Commons
Ruhma Sardar, Tayyaba Anees, Ahmad Sami Al-Shamayleh

et al.

Artificial Intelligence Review, Journal Year: 2025, Volume and Issue: 58(7)

Published: April 11, 2025

Language: Английский

Citations

0