Main Article Content

Abstract

The rising dependence on internet-based services has exposed network infrastructure to increased vulnerability to cyberattacks, especially DDoS attacks. The attacks flood target systems with unwarranted traffic that disrupts legitimate access and undermines service reliability. To overcome this issue, the present paper proposes an optimization-based deep learning model, called Fractional Velocity Contour-based Remora Optimization Algorithm-Deep Stacked Autoencoder (FVCROA_DSA), for high-efficiency DDoS attack detection in a MapReduce environment. The model combines a mean-substitution method for filling data gaps and Support Vector Machine Recursive Feature Elimination (SVM-RFE) in the mapper step to identify the most significant network attributes. This step is followed by the reducer stage, which trains a Deep Stacked AutoEncoder (DSA) to recognize attack patterns, which is then fine-tuned by the proposed FVCROA algorithm. Fractional Calculus leads to increased optimization stability and faster convergence during training. Experimental tests on the BOT-IoT and DDoS Attack datasets show that the FVCROA architecture with DSA achieves higher detection accuracy, with a precision of 93.857, a recall of 94.827, and an F-measure of 94.340, surpassing the current baseline techniques in scalability and reliability.

Keywords

Internet Deep Learning Cybersecurity Attack detection Distributed denial of service

Article Details

How to Cite
Kotawadekar, R. V. ., Vijaykumar, S. ., & Chandran, P. . (2025). Deep stacked autoencoder with fractional VCROA for DDoS attack detection using a big data approach in the MapReduce framework. Future Technology, 5(1), 195–208. Retrieved from https://fupubco.com/futech/article/view/595
Bookmark and Share

References

  1. S. Sumathi and N. Karthikeyan, “Detection of distributed denial of service using deep learning neural network,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 6, pp. 5943–5953, 2021. https://doi.org/10.1007/s12652-020-02144-2
  2. A. Salem and M. A. Mohammed, “DoSTDM: A denial of service detection model using firewall data traffic pattern matching,” Doctoral dissertation, Curtin University, 2013
  3. A. Sharma and A. Bhasin, “Critical investigation of denial of service and distributed denial of service models and tools,” in Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp. 546–550, IEEE, Oct. 2018. doi: 10.1109/ICACCCN.2018.8748468.
  4. BBC News, "https://www.bbc.com/news/technology-53093611" accessed on August 2024.
  5. S. Sumathi and R. Rajesh, “Comparative study on TCP SYN flood DDoS attack detection: a machine learning algorithm based approach,” WSEAS Transactions on Systems and Control, vol. 16, pp. 584–591, 2021. Doi: 10.37394/23203.2021.16.54
  6. D. Akgun, S. Hizal and U. Cavusoglu, “A new DDoS attacks intrusion detection model based on deep learning for cybersecurity,” Computers & Security, vol. 118, p. 102748, 2022. https://doi.org/10.1016/j.cose.2022.102748
  7. M. S. Elsayed, N. A. Le-Khac, S. Dev and A. D. Jurcut, “Network anomaly detection using LSTM based autoencoder,” in Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 37–45, Nov. 2020.
  8. A. A. Diro and N. Chilamkurti, “Distributed attack detection scheme using deep learning approach for Internet of Things,” Future Generation Computer Systems, vol. 82, pp. 761–768, 2018. https://doi.org/10.1016/j.future.2017.08.043
  9. D. Gümüşbaş, T. Yıldırım, A. Genovese and F. Scotti, “A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems,” IEEE Systems Journal, vol. 15, no. 2, pp. 1717–1731, 2020. doi: 10.1109/JSYST.2020.2992966.
  10. D. Brauckhoff, B. Tellenbach, A. Wagner, M. May and A. Lakhina, “Impact of packet sampling on anomaly detection metrics,” in Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 159–164, Oct. 2006.
  11. B. Zhou, J. Li, Y. Ji and M. Guizani, “Online internet traffic monitoring and DDoS attack detection using Big Data frameworks,” in Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1507–1512, IEEE, June 2018. doi: 10.1109/IWCMC.2018.8450335.
  12. D. Han, K. Bi, H. Liu and J. Jia, “A DDoS attack detection system based on spark framework,” Computer Science and Information Systems, vol. 14, no. 3, pp. 769–788, 2017. https://doi.org/10.2298/CSIS161217028H
  13. P. Medeira, J. Grover and M. Khorjiya, “A survey on detecting application layer DDoS using big data technologies,” Journal of Emerging Technologies and Innovative Research (JETIR), 2019.
  14. N. A. Azeez, T. J. Ayemobola, S. Misra, R. Maskeliūnas and R. Damaševičius, “Network intrusion detection with a hashing based apriori algorithm using Hadoop MapReduce,” Computers, vol. 8, no. 4, p. 86, 2019. https://doi.org/10.3390/computers8040086
  15. M. J. Awan, U. Farooq, H. M. A. Babar, A. Yasin, H. Nobanee, M. Hussain et al., “Real-time DDoS attack detection system using big data approach,” Sustainability, vol. 13, no. 19, p. 10743, 2021. https://doi.org/10.3390/su131910743
  16. H. A. Afolabi and A. A. Aburas, “RTL-DL: a hybrid deep learning framework for DDoS attack detection in a big data environment,” International Journal of Computer Networks and Communications (IJCNC), vol. 14, no. 6, pp. 51–66, 2022. DOI:10.5121/ijcnc.2022.14604
  17. B. Zhou, J. Li, J. Wu, S. Guo, Y. Gu and Z. Li, “Machine-learning-based online distributed denial-of-service attack detection using spark streaming,” in Proceedings of the 2018 IEEE International Conference on Communications (ICC), pp. 1–6, IEEE, May 2018. doi: 10.1109/ICC.2018.8422327.
  18. D. Saraladevi and V. K. P. Scholar, “Big Data Analytics Framework for Peer-to-Peer Botnet Detection Using Random Forest and Deep Learning,” International Journal of Computer Science and Information Security (IJCSIS), vol. 15, no. 11, 2017. https://doi.org/10.1016/j.ins.2014.03.066
  19. K. Singh, S. C. Guntuku, A. Thakur and C. Hota, “Big data analytics framework for peer-to-peer botnet detection,” Network, vol. 3, 2014. https://doi.org/10.1016/j.ins.2014.03.066
  20. A. Patcha and J. M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, 2007. https://doi.org/10.1016/j.comnet.2007.02.001
  21. S. Alzahrani and L. Hong, “A survey of cloud computing detection techniques against DDoS attacks,” Journal of Information Security, vol. 9, no. 1, p. 45, 2017. DOI: 10.4236/jis.2018.91005
  22. J. Koo, G. Kang and Y. G. Kim, “Security and privacy in big data life cycle: a survey and open challenges,” Sustainability, vol. 12, no. 24, p. 10571, 2020. https://doi.org/10.3390/su122410571
  23. J. Esmaily, R. Moradinezhad and J. Ghasemi, “Intrusion detection system based on multi-layer perceptron neural networks and decision tree,” in Proceedings of the 2015 7th Conference on Information and Knowledge Technology (IKT), pp. 1–5, IEEE, May 2015. doi: 10.1109/IKT.2015.7288736.
  24. C. Yin, Y. Zhu, J. Fei and X. He, “A deep learning approach for intrusion detection using recurrent neural networks,” IEEE Access, vol. 5, pp. 21954–21961, 2017. doi: 10.1109/ACCESS.2017.2762418.
  25. S. Haider, A. Akhunzada, G. Ahmed and M. Raza, “Deep learning based ensemble convolutional neural network solution for distributed denial of service detection in SDNs,” in Proceedings of the 2019 UK/China Emerging Technologies (UCET), pp. 1–4, IEEE, Aug. 2019. doi: 10.1109/UCET.2019.8881856.
  26. M. Roopak, G. Y. Tian and J. Chambers, “Deep learning models for cyber security in IoT networks,” in Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 452–457, IEEE, Jan. 2019. doi: 10.1109/CCWC.2019.8666588.
  27. A. Agarwal, M. Khari and R. Singh, “Detection of DDoS attack using deep learning model in cloud storage application,” Wireless Personal Communications, vol. 127, no. 1, pp. 419–439, 2022. https://doi.org/10.1007/s11277-021-08271-z
  28. Y. Ding and Y. Zhai, “Intrusion detection system for NSL-KDD dataset using convolutional neural networks,” in Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, pp. 81–85, Dec. 2018.
  29. M. B. Anley, A. Genovese, D. Agostinello and V. Piuri, “Robust DDoS attack detection with adaptive transfer learning,” Computers & Security, vol. 144, p. 103962, 2024. https://doi.org/10.1016/j.cose.2024.103962
  30. S. Aktar and A. Y. Nur, “Towards DDoS attack detection using deep learning approach,” Computers & Security, vol. 129, p. 103251, 2023. https://doi.org/10.1016/j.cose.2023.103251
  31. M. Mittal, K. Kumar and S. Behal, “Deep learning approaches for detecting DDoS attacks: A systematic review,” Soft Computing, vol. 27, no. 18, pp. 13039–13075, 2023. https://doi.org/10.1007/s00500-021-06608-1
  32. A. E. Cil, K. Yildiz and A. Buldu, “Detection of DDoS attacks with feed forward based deep neural network model,” Expert Systems with Applications, vol. 169, p. 114520, 2021. https://doi.org/10.1016/j.eswa.2020.114520
  33. M. P. Novaes, L. F. Carvalho, J. Lloret and M. L. Proença Jr, “Adversarial deep learning approach detection and defense against DDoS attacks in SDN environments,” Future Generation Computer Systems, vol. 125, pp. 156–167, 2021. https://doi.org/10.1016/j.future.2021.06.047
  34. S. Sumathi, R. Rajesh and S. Lim, “Recurrent and deep learning neural network models for DDoS attack detection,” Journal of Sensors, vol. 2022, no. 1, p. 8530312, 2022. https://doi.org/10.1155/2022/8530312
  35. Y. Zhang, Q. Deng, W. Liang and X. Zou, “An efficient feature selection strategy based on multiple support vector machine technology with gene expression data,” BioMed Research International, vol. 2018, no. 1, p. 7538204, 2018. https://doi.org/10.1155/2018/7538204
  36. H. Jia, X. Peng and C. Lang, “Remora optimization algorithm,” Expert Systems with Applications, vol. 185, p. 115665, 2021. https://doi.org/10.1016/j.eswa.2021.115665
  37. Y. Yu, J. Li, J. Li, Y. Xia, Z. Ding and B. Samali, “Automated damage diagnosis of concrete jack arch beam using optimized deep stacked autoencoders and multi-sensor fusion,” Developments in the Built Environment, vol. 14, p. 100128, 2023. https://doi.org/10.1016/j.dibe.2023.100128
  38. P. R. Bhaladhare and D. C. Jinwala, “A clustering approach for the l-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm,” Advances in Computer Engineering, vol. 2014, no. 1, p. 396529, 2014. https://doi.org/10.1155/2014/396529
  39. The BoT- IoT dataset is taken from https://ieee-dataport.org/documents/bot-iot-dataset accessed on July 2024.
  40. The DDoS attack dataset is taken from https://ieee-dataport.org/documents/ddos-attack-dataset#files accessed on July 2024