Affiliation:
1. Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, India.
Abstract
Security is one of the most challenging conditions for dispersed networks because exclusive threats can damage output overall and can be classified in several ways. At this time, distributed denial-of-service (DDoS) assaults pose the greatest threat to internet security. Rapid identification of communication records for messages referencing DDoS occurrences enables organizations to take preventative action by instantly identifying both positive and negative attitudes in cyberspace. This research suggests a method for locating such assaults. The method includes the use of deep learning models that had been trained on the present dataset using Bi Long Short-Term Memory (Bi LSTM). Our model beats more established machine learning techniques, according to the experimental data.The method includes the use of deep learning models that had been trained on the present dataset using Bi Long Short-Term Memory (Bi LSTM). Our model beats more established machine learning techniques, according to the experimental data. Experimental results showed that the proposed technique could achieve an accuracy of 96.7%, making it the best option for use in the detection of breaches applications.
Reference18 articles.
1. T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the DoS and DDoS problems,” ACM Computing Surveys, vol. 39, no. 1, p. 3, Apr. 2007, doi: 10.1145/1216370.1216373.
2. J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, Apr. 2004, doi: 10.1145/997150.997156.
3. K. Sonar, and H. Upadhyay, “A survey: DDOS attack on Internet of Things,” International Journal of Engineering Research and Development, vol. 10, no. 11, pp.58-63, 2014.
4. X. Yuan, C. Li, and X. Li, “DeepDefense: Identifying DDoS Attack via Deep Learning,” 2017 IEEE International Conference on Smart Computing (SMARTCOMP), May 2017, doi: 10.1109/smartcomp.2017.7946998.
5. K. SaiSravani and P. Raja Rajeswari, “Prediction Of Stock Market Exchange Using LSTM Algorithm,” International Journal of Scientific and Technology Research, vol. 9, no. 3, pp.417-421, 2020.