A Hybrid Modified Grasshopper Optimization Algorithm and Genetic Algorithm to Detect and Prevent DDoS Attacks

Publish Year: 1400
نوع سند: مقاله ژورنالی
زبان: English
View: 338

This Paper With 14 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJE-34-4_007

تاریخ نمایه سازی: 6 اردیبهشت 1400

Abstract:

Cybersecurity has turned into a brutal and vicious environment due to the expansion of cyber-threats and cyberbullying. Distributed Denial of Service (DDoS) is a network menace that compromises victims’ resources promptly. Considering the significant role of optimization algorithms in the highly accurate and adaptive detection of network attacks, the present study has proposed Hybrid Modified Grasshopper Optimization algorithm and Genetic Algorithm (HMGOGA) to detect and prevent DDoS attacks. HMGOGA overcomes conventional GOA drawbacks like low convergence speed and getting stuck in local optimum. In this paper, the proposed algorithm is used to detect DDoS attacks through the combined nonlinear regression (NR)-sigmoid model simulation. In order to serve this purpose, initially, the most important features in the network packages are extracted using the Random Forest (RF) method. By removing ۵۵ irrelevant features out of a total of ۷۷, the selected ones play a key role in the proposed model’s performance. To affirm the efficiency, the high correlation of the selected features was measured with Decision Tree (DT). Subsequently, the HMGOGA is trained with benchmark cost functions and another proposed cost function that enabling it to detect malicious traffic properly. The usability of the proposed model is evaluated by comparing with two benchmark functions (Sphere and Ackley function). The experimental results have proved that HMGOGA based on NR-sigmoid outperforms other implemented models and conventional GOA methods with ۹۹.۹۰% and ۹۹.۳۴% train and test accuracy, respectively.

Authors

S. Mohammadi

Department of Industrial Engineering, K.N. Toosi University of Technology, Tehran, Iran

M. Babagoli

Department of Industrial Engineering, K.N. Toosi University of Technology, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • 1.     A. Saied, R. E. Overill, and T. J. N. ...
  • 2.     O. Osanaiye, K.-K. R. Choo, M. J. J. o. ...
  • 3.     C. Kolias, G. Kambourakis, A. Stavrou, and J. J. ...
  • 4.     J. Wang, M. Yin, and J. J. T. C. ...
  • 5.     C. Wang, T. T. Miu, X. Luo, J. J. ...
  • 6.     Gharvirian, Fateme, and Ali Bohloli. "Neural network based protection ...
  • 7.     A. R. a. Yusof, N. I. Udzir, and A. ...
  • 8.     Ö. Cepheli, S. Büyükçorak, G. J. J. o. E. ...
  • 9.     M. H. Bhuyan, D. Bhattacharyya, J. K. J. S. ...
  • 10.   Shamshirband, Shahab, Mahdis Fathi, Anthony T. Chronopoulos, Antonio Montieri, ...
  • 11.   Beiki, H., S. M. Seyedhosseini, V. R. Ghezavati, and ...
  • 12 .   Fathollahi-Fard, Amir Mohammad, Mostafa Hajiaghaei-Keshteli, and Reza Tavakkoli-Moghaddam. ...
  • 13.   Hajiaghaei-Keshteli, Mostafa, Ahmad J Afshari, and Elahe Nasiri. "Addressing ...
  •  DOI: 10.5829/idosi.ije.2017.30.03c.10 ...
  • 14.   Fathollahi-Fard, Amir Mohammad, Mostafa Hajiaghaei-Keshteli, and Seyedali Mirjalili. "A ...
  • 15.   I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, ...
  • 16.   Y. Gu, K. Li, Z. Guo, and Y. J. ...
  • 17.   Ghasemi, J., and J. Esmaily. "A novel intrusion detection ...
  • 18.   S. M. T. Nezhad, M. Nazari, and E. A. ...
  • 19.   X. Chen, S. J. I. T. o. I. Yu, ...
  • 20.   Singh, Maninder Pal, and Abhinav Bhandari. "New-flow based DDoS ...
  • 21.   Q. Niyaz, W. Sun, and A. Y. J. a. ...
  • 22.   D. Arivudainambi, V. K. KA, S. S. J. N. ...
  • 23.   M. Yazdani, F. J. J. o. c. d. Jolai, ...
  • 24.   I. Sreeram, V. P. K. J. A. c. Vuppala, ...
  • 25.   N. Dayal, P. Maity, S. Srivastava, R. J. S. ...
  •  26.  Bala, Ritu, and Ritu Nagpal. "A REVIEW ON KDD ...
  • https://doi.org/10.26483/ijarcs.v10i2.6395 ...
  • 27.   I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, ...
  • 28.   S. Alelyani, J. Tang, and H. Liu, "Feature selection ...
  • 29.   A. B. Brahim, M.. Limam, , "Ensemble feature selection ...
  • 30.   T. J. Bihl, K. W. Bauer, M. A. J. ...
  • analysis and using ZigBee device emissions," IEEE Transactions on Information ...
  • 31.   S. Saremi, S. Mirjalili, and A. J. A. i. ...
  • 32.   S. Saremi, S. Mirjalili, S. Mirjalili, and J. S. ...
  • 33.   Abualigah, Laith, and Ali Diabat. "A comprehensive survey of ...
  • 34.   Bansal, Priti, Sachin Kumar, Sagar Pasrija, and Sachin Singh. ...
  • 35.   J. Luo, H. Chen, Y. Xu, H. Huang, and ...
  • 36.   Joshi, Susheel Kumar, and Jagdish Chand Bansal. "Parameter tuning ...
  • 37.   H. Binol, I. Guvenc, E. Bulut, and K. J. ...
  • 38.   D. Ackley, A connectionist machine for genetic hillclimbing. Springer ...
  • 39.   M. Babagoli, M. P. Aghababa, and V. J. S. ...
  • 40.   S. Mirjalili and A. J. A. i. e. s. ...
  • 41.   Haddadi, Mohamed, and Rachid Beghdad. "A Confidence Interval Based ...
  • 42.   S. Bista and R. J. J. o. I. S. ...
  • نمایش کامل مراجع