{"title":"用于识别和缓解 SD-IoT 中 DDoS 攻击的优化深度策略。","authors":"Kalpana Kumbhar, Prachi Mukherji","doi":"10.1080/0954898X.2024.2356852","DOIUrl":null,"url":null,"abstract":"<p><p>The attacks like distributed denial-of-service (DDoS) are termed as severe defence issues in data centres, and are considered real network threat. These types of attacks can produce huge disturbances in information technologies. In addition, it is a complex task to determine and fully alleviate DDoS attacks. The new strategy is developed to identify and alleviate DDoS attacks in the Software-Defined Internet of Things (SD-IoT) model. SD-IoT simulation is executed to gather data. The data collected through nodes of SD-IoT are fed to the selection of feature phases. Here, the hybrid process is considered to select features, wherein features, like wrapper-based technique, cosine similarity-based technique, and entropy-based technique are utilized to choose the significant features. Thereafter, the attack discovery process is done with Elephant Water Cycle (EWC)-assisted deep neuro-fuzzy network (DNFN). The EWC is adapted to train DNFN, and here EWC is obtained by grouping Elephant Herd Optimization (EHO) and water cycle algorithm (WCA). Finally, attack mitigation is carried out to secure the SD-IoT. The EWC-assisted DNFN revealed the highest accuracy of 96.9%, TNR of 98%, TPR of 90%, precision of 93%, and F1-score of 91%, when compared with other related techniques.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-32"},"PeriodicalIF":1.1000,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An optimized deep strategy for recognition and alleviation of DDoS attack in SD-IoT.\",\"authors\":\"Kalpana Kumbhar, Prachi Mukherji\",\"doi\":\"10.1080/0954898X.2024.2356852\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>The attacks like distributed denial-of-service (DDoS) are termed as severe defence issues in data centres, and are considered real network threat. These types of attacks can produce huge disturbances in information technologies. In addition, it is a complex task to determine and fully alleviate DDoS attacks. The new strategy is developed to identify and alleviate DDoS attacks in the Software-Defined Internet of Things (SD-IoT) model. SD-IoT simulation is executed to gather data. The data collected through nodes of SD-IoT are fed to the selection of feature phases. Here, the hybrid process is considered to select features, wherein features, like wrapper-based technique, cosine similarity-based technique, and entropy-based technique are utilized to choose the significant features. Thereafter, the attack discovery process is done with Elephant Water Cycle (EWC)-assisted deep neuro-fuzzy network (DNFN). The EWC is adapted to train DNFN, and here EWC is obtained by grouping Elephant Herd Optimization (EHO) and water cycle algorithm (WCA). Finally, attack mitigation is carried out to secure the SD-IoT. The EWC-assisted DNFN revealed the highest accuracy of 96.9%, TNR of 98%, TPR of 90%, precision of 93%, and F1-score of 91%, when compared with other related techniques.</p>\",\"PeriodicalId\":54735,\"journal\":{\"name\":\"Network-Computation in Neural Systems\",\"volume\":\" \",\"pages\":\"1-32\"},\"PeriodicalIF\":1.1000,\"publicationDate\":\"2024-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network-Computation in Neural Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1080/0954898X.2024.2356852\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network-Computation in Neural Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/0954898X.2024.2356852","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
An optimized deep strategy for recognition and alleviation of DDoS attack in SD-IoT.
The attacks like distributed denial-of-service (DDoS) are termed as severe defence issues in data centres, and are considered real network threat. These types of attacks can produce huge disturbances in information technologies. In addition, it is a complex task to determine and fully alleviate DDoS attacks. The new strategy is developed to identify and alleviate DDoS attacks in the Software-Defined Internet of Things (SD-IoT) model. SD-IoT simulation is executed to gather data. The data collected through nodes of SD-IoT are fed to the selection of feature phases. Here, the hybrid process is considered to select features, wherein features, like wrapper-based technique, cosine similarity-based technique, and entropy-based technique are utilized to choose the significant features. Thereafter, the attack discovery process is done with Elephant Water Cycle (EWC)-assisted deep neuro-fuzzy network (DNFN). The EWC is adapted to train DNFN, and here EWC is obtained by grouping Elephant Herd Optimization (EHO) and water cycle algorithm (WCA). Finally, attack mitigation is carried out to secure the SD-IoT. The EWC-assisted DNFN revealed the highest accuracy of 96.9%, TNR of 98%, TPR of 90%, precision of 93%, and F1-score of 91%, when compared with other related techniques.
期刊介绍:
Network: Computation in Neural Systems welcomes submissions of research papers that integrate theoretical neuroscience with experimental data, emphasizing the utilization of cutting-edge technologies. We invite authors and researchers to contribute their work in the following areas:
Theoretical Neuroscience: This section encompasses neural network modeling approaches that elucidate brain function.
Neural Networks in Data Analysis and Pattern Recognition: We encourage submissions exploring the use of neural networks for data analysis and pattern recognition, including but not limited to image analysis and speech processing applications.
Neural Networks in Control Systems: This category encompasses the utilization of neural networks in control systems, including robotics, state estimation, fault detection, and diagnosis.
Analysis of Neurophysiological Data: We invite submissions focusing on the analysis of neurophysiology data obtained from experimental studies involving animals.
Analysis of Experimental Data on the Human Brain: This section includes papers analyzing experimental data from studies on the human brain, utilizing imaging techniques such as MRI, fMRI, EEG, and PET.
Neurobiological Foundations of Consciousness: We encourage submissions exploring the neural bases of consciousness in the brain and its simulation in machines.