An Efficient Technique for Identifying Distributed Denial ofService Active Assaults Using Deep Neural Networks Based on the Adaptive System Intelligence Paradigm
-
https://doi.org/10.14419/dwfxsc41
Received date: May 30, 2025
Accepted date: June 24, 2025
Published date: July 3, 2025
-
Active Attacks; Detection; Deep Neural Network; DDoS; Optimization; Adaptive Learning -
Abstract
A collection of interconnected devices that exchange data online is known as the Internet of Things. The IoT environment's diverse components make the distributed denial-of-service attack a security risk. One of the most important tasks in creating a smarter environment for end users is detecting DDoS attacks in the Internet of Things. A new version of the optimized Elman recurrent neural network (ERNN) is proposed to detect DDoS active attacks in Internet of Things scenarios. The proposed detection approach optimizes the weight and bias of ERNN (ABCO-ERNN) using a novel adaptive bacterial colony optimization (ABCO) technique. The ABCO algorithm uses an adaptable step size to increase the BCO's capacity for both exploration and exploitation. The four datasets, BoT-IoT, CIC-IDS2017, CIC-DDoS2019, and IoTID20, are used to compare performance, and five distinct performance measures, including accuracy, precision, sensitivity, specificity-ty, and f-measure, are considered. When compared to previous literature algorithms, the proposed ABCO-ERNN detection approach produced a high detection rate according to the experimental results.
-
References
- S. V. K, G. K. V, A. K. D, P. L. B, and Y. B, "AOA based Masked Region-CNN model for Detection of Parking Space in IoT Environment," International Research Journal of Multidisciplinary Technovation, vol. 6, no. 1, pp. 97-108, 01/27 2024, https://doi.org/10.54392/irjmt2418.
- F. Ullah et al., "Cyber security threats detection in internet of things using deep learning approach," IEEE access, vol. 7, pp. 124379-124389, 2019. https://doi.org/10.1109/ACCESS.2019.2937347.
- R. Kavitha, K. Saravanan, S. A. Jebakumari, and K. Velusamy, "Machine learning algorithms for IoT applications," in Artificial Intelligence for Internet of Things: CRC Press, 2022, pp. 185-214. https://doi.org/10.1201/9781003335801-11.
- D. N, J. Katiravan, and S. S.P, "Botnet Attack Detection in IoT Devices using Ensemble Classifiers with Reduced Feature Space," International Research Journal of Multidisciplinary Technovation, vol. 6, no. 3, pp. 274-295, 05/22 2024, https://doi.org/10.54392/irjmt24321.
- S. K. V, M. K. V, C. N. Azmea, and K. K. Vaigandla, "BCSDNCC: A Secure Blockchain SDN framework for IoT and Cloud Computing," International Research Journal of Multidisciplinary Technovation, vol. 6, no. 3, pp. 26-44, 04/16 2024, https://doi.org/10.54392/irjmt2433.
- N. K. Muthunambu, S. Prabakaran, B. PrabhuKavin, K. S. Siruvangur, K. Chinnadurai, and J. Ali, "A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM," Computers, Materials & Continua, vol. 78, no. 3, 2024. https://doi.org/10.32604/cmc.2023.043172.
- E. Gyamfi and A. Jurcut, "Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets," Sensors, vol. 22, no. 10, p. 3744, 2022. https://doi.org/10.3390/s22103744.
- R. Raphael and P. Mathiyalagan, "Intelligent Hyperparameter Tuned Deep Learning based Android Malware Detection and Classification Model," Journal of Circuits, Systems and Computers, 2022. https://doi.org/10.1142/S0218126623501918.
- K. Vijayakumari and V. Baby Deepa, "Fuzzy C-Means Hybrid with Fuzzy Bacterial Colony Optimization," in Advances in Electrical and Computer Technologies: Select Proceedings of ICAECT 2020, 2021: Springer Singapore, pp. 75-87. https://doi.org/10.1007/978-981-15-9019-1_7.
- K. Tamilarisi, M. Gogulkumar, and K. Velusamy, "Data clustering using bacterial colony optimization with particle swarm optimization," in 2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2021: IEEE, pp. 1-5. https://doi.org/10.1109/ICECCT52121.2021.9616695.
- H. Wang, L. Tan, and B. Niu, "Feature selection for classification of microarray gene expression cancers using Bacterial Colony Optimization with multi-dimensional population," Swarm and Evolutionary Computation, vol. 48, pp. 172-181, 2019. https://doi.org/10.1016/j.swevo.2019.04.004.
- B. Niu, T. Xie, Y. Bi, and J. Liu, "Bacterial colony optimization for integrated yard truck scheduling and storage allocation problem," in International Conference on Intelligent Computing, 2014: Springer, pp. 431-437. https://doi.org/10.1007/978-3-319-09330-7_50.
- B. Niu, Q. Liu, Z. Wang, L. Tan, and L. Li, "Multi-objective bacterial colony optimization algorithm for integrated container terminal scheduling problem," Natural Computing, vol. 20, no. 1, pp. 89-104, 2021. https://doi.org/10.1007/s11047-019-09781-3.
- B. Bala and S. Behal, "AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges," Computer science review, vol. 52, p. 100631, 2024. https://doi.org/10.1016/j.cosrev.2024.100631.
- Kaliyaperumal, D. K., Boddu, P. R. S. K. ., & Oruganti, P. S. K. . (2025). An analysis of alternative machine learning and deep learningalgorithms for categorization and detection of various active network assaults. International Journal of Basic and Applied Sciences, 14(1), 414-421. https://doi.org/10.14419/zywhgb37
- S. S. Babu and K. Jayasudha, "A simplex method-based bacterial colony optimization for data clustering," in Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2021: Springer, 2022, pp. 987-995https://doi.org/10.1007/978-981-16-7167-8_72.
- B. Gupta, P. Chaudhary, X. Chang, and N. Nedjah, "Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers," Computers & Electrical Engineering, vol. 98, p. 107726, 2022. https://doi.org/10.1016/j.compeleceng.2022.107726.
- A. K. Balyan et al., "A hybrid intrusion detection model using ega-pso and improved random forest method," Sensors, vol. 22, no. 16, p. 5986, 2022. https://doi.org/10.3390/s22165986.
- A. A. Alsulami, Q. Abu Al-Haija, A. Tayeb, and A. Alqahtani, "An Intrusion Detection and Classification System for IoT Traffic with Improved Data Engineering," Applied Sciences, vol. 12, no. 23, p. 12336, 2022. https://doi.org/10.3390/app122312336.
- B. Sivasakthi and D. Selvanayagi, "Prediction of Osteoporosis Disease Using Enhanced Elman Recurrent Neural Network with Bacterial Colony Optimization," in Computational Vision and Bio-Inspired Computing: Proceedings of ICCVBIC 2022: Springer, 2023, pp. 211-220https://doi.org/10.1007/978-981-19-9819-5_16.
- A. Mihoub, O. B. Fredj, O. Cheikhrouhou, M. Krichen, "Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques," Computers & Electrical Engineering, vol. 98, p. 107716, 2022. https://doi.org/10.1016/j.compeleceng.2022.107716.
- K. O. Adefemi Alimi, K. Ouahada, A. M. Abu-Mahfouz, and O. A. Alimi, "Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things," Journal of Sensor and Actuator Networks, vol. 11, no. 3, p. 32, 2022. https://doi.org/10.3390/jsan11030032.
- N. F. Syed, Z. Baig, A. Ibrahim, and C. Valli, "Denial of service attack detection through machine learning for the IoT," Journal of Information and Telecommunication, vol. 4, no. 4, pp. 482-503, 2020. https://doi.org/10.1080/24751839.2020.1767484.
- O. Yousuf and R. N. Mir, "DDoS attack detection in Internet of Things using recurrent neural network," Computers and Electrical Engineering, vol. 101, p. 108034, 2022. https://doi.org/10.1016/j.compeleceng.2022.108034.
- I. Katib and M. Ragab, "Blockchain-assisted hybrid harris hawks optimization based deep DDoS attack detection in the IoT environment," Mathematics, vol. 11, no. 8, p. 1887, 2023. https://doi.org/10.3390/math11081887
- S. Muthukumar and A. Ashfauk Ahamed, "A novel framework of DDoS attack detection in network using hybrid heuristic deep learning approaches with attention mechanism," Journal of High Speed Networks, no. Preprint, pp. 1-27, 2024. https://doi.org/10.3233/JHS-230142.
- Y. K. Beshah, S. L. Abebe, and H. M. Melaku, "Drift Adaptive Online DDoS Attack Detection Framework for IoT System," Electronics, vol. 13, no. 6, p. 1004, 2024. https://doi.org/10.3390/electronics13061004
- J. Bhayo, S. A. Shah, & D. Draheim, "Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks," Engineering Applications of Artificial Intelligence, vol. 123, p. 106432, 2023. https://doi.org/10.1016/j.engappai.2023.106432
- H. Lv, Y. Du, X. Zhou, W. Ni, and X. Ma, "A Data Enhancement Algorithm for DDoS Attacks Using IoT," Sensors, vol. 23, no. 17, p. 7496, 2023. https://doi.org/10.3390/s23177496.
- B. Niu and H. Wang, "Bacterial colony optimization," Discrete Dynamics in Nature and Society, vol. 2012, 2012. https://doi.org/10.1155/2012/698057.
- R. Li and Z.-J. Hu, "A self-adaptive particle swarm optimisation and bacterial foraging hybrid algorithm," International Journal of Wireless and Mobile Computing, vol. 11, no. 3, pp. 258-265, 2016. https://doi.org/10.1504/IJWMC.2016.081157.
- S. S. Babu and K. Jayasudha, "A simplex method-based bacterial colony optimization algorithm for data clustering analysis," International Journal of Pattern Recognition and Artificial Intelligence, vol. 36, no. 12, p. 2259027, 2022. https://doi.org/10.1142/S0218001422590273.
- V. Prakash, V. Vinothina, K. Kalaiselvi, and K. Velusamy, "An improved bacterial colony optimization using opposition-based learning for data clustering," Cluster Computing, vol. 25, no. 6, pp. 4009-4025, 2022. https://doi.org/10.1007/s10586-022-03633-z.
- K. Velusamy and R. Amalraj, "Performance of the cascade correlation neural network for predicting the stock price," in 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2017: IEEE, pp. 1-6. https://doi.org/10.1109/ICECCT.2017.8117824.
- V. Kůrková, "Kolmogorov's theorem and multilayer neural networks," Neural networks, vol. 5, no. 3, pp. 501-506, 1992. https://doi.org/10.1016/0893-6080(92)90012-8.
- M. F. Ab Aziz, S. A. Mostafa, C. F. M. Foozy, M. A. Mohammed, M. Elhoseny, and A. Z. Abualkishik, "Integrating Elman recurrent neural network with particle swarm optimization algorithms for an improved hybrid training of multidisciplinary datasets," Expert Systems with Applications, vol. 183, p. 115441, 2021. https://doi.org/10.1016/j.eswa.2021.115441.
- A. Sadeghi-Niaraki, P. Mirshafiei, M. Shakeri, and S.-M. Choi, "Short-term traffic flow prediction using the modified elman recurrent neural network optimized through a genetic algorithm," IEEE Access, vol. 8, pp. 217526-217540, 2020. https://doi.org/10.1109/ACCESS.2020.3039410.
- K. Xie, H. Yi, G. Hu, L. Li, and Z. Fan, "Short-term power load forecasting based on Elman neural network with particle swarm optimization," Neurocomputing, vol. 416, pp. 136-142, 2020. https://doi.org/10.1016/j.neucom.2019.02.063.
- L. Yang, F. Wang, J. Zhang, and W. Ren, "Remaining useful life prediction of ultrasonic motor based on Elman neural network with improved particle swarm optimization," Measurement, vol. 143, pp. 27-38, 2019. https://doi.org/10.1016/j.measurement.2019.05.013.
- P. Jayapriya and S. Hemalatha, "Bacterial Foraging Optimization based Recurrent Neural Network Approach ForIdentification and Classification of Maize Plant Disease," in 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT), 2022: IEEE, pp. 35-43. https://doi.org/10.1109/ICICICT54557.2022.9917607
-
Downloads
-
How to Cite
Kaliyaperumal, K. ., Boddu, R. S. K. . ., Oruganti , S. K. ., Kebesa , G. T. ., Aghaeiboorkheili , M. ., & Bhojan, R. . (2025). An Efficient Technique for Identifying Distributed Denial ofService Active Assaults Using Deep Neural Networks Based on the Adaptive System Intelligence Paradigm. International Journal of Basic and Applied Sciences, 14(2), 577-590. https://doi.org/10.14419/dwfxsc41
