556
Views
14
CrossRef citations to date
0
Altmetric
Articles

Defense against distributed DoS attack detection by using intelligent evolutionary algorithm

, ORCID Icon &
Pages 219-229 | Received 29 Aug 2019, Accepted 22 Dec 2019, Published online: 30 Jan 2020
 

ABSTRACT

Modern society is prominently dependent on information and communication technology over the last few decades has carried it with more vulnerability to an enormous variety of cyber-attacks. One of the attacks is a Distributed Denial-of-Service (DDoS) that exploits the power of thousands and sometimes hundreds of thousands of compromised computers to attack information-providing services and online commercial sites, often resulting in significant downtime and financial losses and thereby denying services of legitimate clients. The study of DDoS attacks is a significant area of research; there are a number of techniques that have been proposed such as evolutionary algorithm and artificial intelligence in the literature for detecting DDoS attacks. Unfortunately, the modern well-known DDoS detection schemes are deteriorating to validate the objective and prior recognition of DDoS attacks. In order to mitigate denial of service attacks, in this paper, we use grasshopper optimization algorithm (GOA) with machine learning algorithm called GOIDS. This approach is based on creating an intrusion detection system (IDS) to fulfill the requirements of the monitored environment and able to distinguish between normal and attack traffics. Furthermore, GOIDS selects the most relevant features from the original IDS dataset that can help to distinguish typical low-speed DDoS attacks and then, selected features are passed to the classifiers, i.e. support vector machine, decision tree, naïve Bayes, and multilayer perceptron to identify type of attack. The publicly available dataset as KDD Cup 99 and CIC-IDS 2017 are used for our experimental study. From the results of the simulation, it is clear that GOIDS with decision tree acquires high detection and accuracy with a low false–positive rate.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

Shubhra Dwivedi

Shubhra Dwivedi is a research scholar, at the NIT Raipur, India. She holds a B.Tech degree in Computer Science and Engineering from UPTU University, an M.tech degree in Software Engineering from RGPV University, India. She is doing Ph.D. as research scholar in NIT Raipur, India. Her research is centered in network security, big data, and Bio-inspired domains.

Manu Vardhan

Manu Vardhan received the M.Tech degree in computer science from BITS Pilani, Pilani, India, in 2009, and the Ph.D. degree in computer science and engineering from the Motilal Nehru National Institute of Technology Allahabad, India, in 2014. He has been an Assistant Professor with the Department of Computer Science and Engineering, National Institute of Technology, Raipur, since 2013. He has authored over 25 research papers in national and international conferences and journals. His current research interests include distributed systems and cloud computing.

Sarsij Tripathi

Sarsij Tripathi received the M.Tech degree in computer science from Motilal Nehru National Institute of Technology, Allahabad, India, in 2008, and the Ph.D. degree in computer science and engineering from the Motilal Nehru National Institute of Technology Allahabad, India, in 2013. He has been an Assistant Professor with the Department of Computer Science and Engineering, National Institute of Technology, Raipur, since 2015. He has authored quality of research papers in national and international conferences and journals. His current research interests include Real time distributed System, Ad-Hoc Network and cloud computing.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.