FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Attack Detection using DL based Feature Selection with Improved Convolutional Neural Network

Author(s): Dr. V. Gokula Krishnan1*, S. Hemamalini2, Praneeth Cheraku3, K. Hema Priya4, Sangeetha Ganesan5 and Dr. R. Balamanigandan6

Publisher : FOREX Publication

Published : 30 May 2023

e-ISSN : 2347-470X

Page(s) : 308-314




Dr. V. Gokula Krishnan*, Professor, Department of CSE, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai, Tamil Nadu, India; Email: gokul_kris143@yahoo.com

S. Hemamalini, Associate Professor, Department of CSE, Panimalar Engineering College, Poonamallee, Chennai, Tamil Nadu, India; Email: hemamalini.selvamani@gmail.com

Praneeth Cheraku, Assistant Professor, Department of Information Technology, PVP Siddhartha Institute of Technology, Vijayawada, Andhra Pradesh, India; Email: chpraneeth@hotmail.com

K. Hema Priya, Assistant Professor, Department of CSE, Easwari Engineering College, Ramapuram, Chennai, Tamil Nadu, India; Email: hemu.june3@gmail.com

Sangeetha Ganesan, Department of AIDS, R M K College of Engineering and Technology, Kavaraipettai, Tamil Nadu, India; Email: gsangeethakarthik@gmail.com

Dr. R. Balamanigandan, Associate Professor, Department of CSE, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai, Tamil Nadu, India; Email: balamanigandanr.sse@saveetha.com

    [1] Salunke, K. and Ragavendran, U., 2021. Shield techniques for application layer DDoS attack in MANET: a methodological review. Wireless Personal Communications, 120(4), pp.2773-2799. [Cross Ref]
    [2] Kolandaisamy, R., Noor, R.M., Kolandaisamy, I., Ahmedy, I., Kiah, M.L.M., Tamil, M.E.M. and Nandy, T., 2021. A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET. Journal of Ambient Intelligence and Humanized Computing, 12, pp.6599-6612. [Cross Ref]
    [3] Rajpoot, C.S., Bairwa, A.K. and Sharma, V.K., 2021. Mitigating the impact of DDoS attack on upsurge network performance in MANET. In Proceedings of International Conference on Communication and Computational Technologies: ICCCT-2019 (pp. 153-164). Springer Singapore. [Cross Ref]
    [4] DHINDSA, K.S. and SINGH, K., 2021. Entropy-based DDoS Attack Detection in Cluster-based Mobile Ad Hoc Networks. Adhoc & Sensor Wireless Networks, 49.
    [5] Kurian, S. and Ramasamy, L., 2021. Securing service discovery from denial of service attack in mobile ad hoc network (MANET). International Journal of Computer Networks and Applications, 8(5), pp.619-633. [Cross Ref]
    [6] Revathi, M., Ramalingam, V.V. and Amutha, B., 2021. A machine learning based detection and mitigation of the DDOS attack by using SDN controller framework. Wireless Personal Communications, pp.1-25. [Cross Ref]
    [7] Mahajan, R. and Zafar, S., 2021. DDoS attacks impact on data transfer in IOT-MANET-based E-Healthcare for Tackling COVID-19. In Data Analytics and Management: Proceedings of ICDAM (pp. 301-309). Springer Singapore. [Cross Ref]
    [8] Yungaicela-Naula, N.M., Vargas-Rosales, C. and Perez-Diaz, J.A., 2021. SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access, 9, pp.108495-108512. [Cross Ref]
    [9] Mittal, M., Kumar, K. and Behal, S., 2022. Deep learning approaches for detecting DDoS attacks: A systematic review. Soft Computing, pp.1-37. [Cross Ref]
    [10] Bhayo, J., Jafaq, R., Ahmed, A., Hameed, S. and Shah, S.A., 2021. A time-efficient approach toward DDoS attack detection in IoT network using SDN. IEEE Internet of Things Journal, 9(5), pp.3612-3630. [Cross Ref]
    [11] Hadi, R.M., Abdullah, S.H. and Abedi, W.M.S., 2022. Proposed neural intrusion detection system to detect denial of service attacks in MANETs. Periodicals of Engineering and Natural Sciences, 10(3), pp.70-78. [Cross Ref]
    [12] Agarwal, A., Khari, M. and Singh, R., 2021. Detection of DDOS attack using deep learning model in cloud storage application. Wireless Personal Communications, pp.1-21. [Cross Ref]
    [13] Talukdar, M.I., Hassan, R., Hossen, M.S., Ahmad, K., Qamar, F. and Ahmed, A.S., 2021. Performance improvements of AODV by black hole attack detection using IDS and digital signature. Wireless Communications and Mobile Computing, 2021, pp.1-13. [Cross Ref]
    [14] Alsumayt, A., 2022, April. Detect Denial of Service Attack (DoS) in MANETs Partition Scenario Using Puzzle Map Method. In Journal of Physics: Conference Series (Vol. 2224, No. 1, p. 012081). IOP Publishing. [Cross Ref]
    [15] Lin, H., Wu, C. and Masdari, M., 2022. A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques. Computers and Electrical Engineering, 104, p.108466. [Cross Ref]
    [16] Abu Bakar, R., Huang, X., Javed, M.S., Hussain, S. and Majeed, M.F., 2023. An Intelligent Agent-Based Detection System for DDoS Attacks Using Automatic Feature Extraction and Selection. Sensors, 23(6), p.3333. [Cross Ref]
    [17] Ninu, S.B., 2023. An intrusion detection system using Exponential Henry Gas Solubility Optimization based Deep Neuro Fuzzy Network in MANET. Engineering Applications of Artificial Intelligence, 123, p.105969. [Cross Ref]
    [18] Prashanth, S.K., Iqbal, H. and Illuri, B., 2023. An Enhanced Grey Wolf Optimisation–Deterministic Convolutional Neural Network (GWO–DCNN) Model-Based IDS in MANET. Journal of Information & Knowledge Management, p.2350010. [Cross Ref]
    [19] Elubeyd, H. and Yiltas-Kaplan, D., 2023. Hybrid Deep Learning Approach for Automatic Dos/DDoS Attacks Detection in Software-Defined Networks. Applied Sciences, 13(6), p.3828. [Cross Ref]
    [20] Abdelhamid, A., Elsayed, M.S., Jurcut, A.D. and Azer, M.A., 2023. A Lightweight Anomaly Detection System for Black Hole Attack. Electronics, 12(6), p.1294. [Cross Ref]
    [21] Vijayalakshmi, S., Bose, S., Logeswari, G. and Anitha, T., 2023. Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory. Cyber Security and Applications, 1, p.100011. [Cross Ref]
    [22] Wroge, T.J.; Özkanca, Y.; Demiroglu, C.; Si, D.; Atkins, D.C.; Ghomi, R.H. Parkinson’s disease diagnosis using machine learning and voice. In Proceedings of the 2018 IEEE Signal Processing in Medicine and Biology Symposium (SPMB), IEEE, Philadelphia, PA, USA, 1 December 2018. [Cross Ref]
    [23] Lin, C.-H.; Wu, J.-X.; Li, C.-M.; Chen, P.-Y.; Pai, N.-S.; Kuo, Y.-C. Enhancement of Chest X-ray Images to Improve Screening Accuracy Rate Using Iterated Function System and Multilayer Fractional-Order Machine Learning Classifier. IEEE Photon. J. 2020, 12, 1–18. [Cross Ref]
    [24] Kasongo, S.M. A Deep Learning Technique for Intrusion Detection System Using a Recurrent Neural Networks Based Framework. Comput. Commun. 2023, 199, 113–125. [Cross Ref]

Dr. V. Gokula Krishnan, S. Hemamalini, Praneeth Cheraku, K. Hema Priya, Sangeetha Ganesan and Dr. R. Balamanigandan (2023), Attack Detection using DL based Feature Selection with Improved Convolutional Neural Network. IJEER 11(2), 308-314. DOI: 10.37391/IJEER.110209.