Skip to main content
Log in

Belief-DDoS: stepping up DDoS attack detection model using DBN algorithm

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Distributed Denial of Services (DDoS) attacks severely impact various systems. Traditional approaches like signature-based and scrubbing methods remain shortcomings in detecting extensive sophisticated attacks. Thus, this paper proposes a Deep Belief Network (DBN) to construct an intelligent detection model using automated feature representation. Instead of using conventional machine learning methods, we employ the DBN to train a classification model that can effectively detect DDoS attacks. Based on the experimental results, our proposed model can obtain a higher accuracy with a tiny loss.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig.1

Similar content being viewed by others

Data availability

Data supporting this study are openly available upon reasonable request.

References

  1. Maslan A, Mohamad K, Mohd Foozy F (2020) Feature selection for DDoS detection using classification machine learning techniques. IAES Int J Artif Intellig 9(1):137–145

    Google Scholar 

  2. Wanda P (2023) GRUSpam: robust e-mail spam detection using gated recurrent unit (GRU) algorithm. Int J Inf Tecnol. https://doi.org/10.1007/s41870-023-01516-z

    Article  Google Scholar 

  3. Seyyed MTN, Mahboubeh N, Ebrahim AG (2016) A novel DoS and DDoS attacks detection algorithm using ARIMA time series model and chaotic system in computer networks. IEEE 20(4):1089–7798

    Google Scholar 

  4. Velliangiri S, Karthikeyan P, Vinoth Kumar V (2021) Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. J Experim Theoret Artific Intellig 33(3):405–425

    Article  Google Scholar 

  5. ur Rehman S, Khaliq M, Imtiaz SI, Rasool A, Shafiq M, Javed AR, Jalil Z, Bashir AK (2021) DIDDOS: an approach for detection and identification of distributed denial of service (DDoS) cyberattacks using Gated Recurrent Units (GRU). Fut Generat Compu Sys 118:453–466

    Article  Google Scholar 

  6. Verma P, Tapaswi S, Godfrey WW (2021) A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack. Wireless Netw 27:2529–2548. https://doi.org/10.1007/s11276-021-02604-3

    Article  Google Scholar 

  7. Alan S, Richard EO, Tomasz E (2015) Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172:385–393

    Google Scholar 

  8. Hnamte V, Hussain J (2023) An efficient DDoS attack detection mechanism in SDN environment. Int j inf tecnol 15:2623–2636. https://doi.org/10.1007/s41870-023-01332-5

    Article  Google Scholar 

  9. Peng W, Yufeng L, Zhen Z, Tao H, Ziyong L, Diyang L (2019) An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7:87593–87605

    Article  Google Scholar 

  10. Qiuting T, Dezhi H, Kuan-C L, Xingao L, Letian D, Arcangelo C (2020) An intrusion detection approach based on improved deep belief network. Springer Sci. https://doi.org/10.1007/s10489-02001694-4

    Article  Google Scholar 

  11. Dali S, Jinlian D, Wei Z, Jie C, Weisheng Z, Jiawei X (2021) A Statistical Image Feature-Based Deep Belief Network for Fire Detection. Complexity. https://doi.org/10.1155/2021/5554316

    Article  Google Scholar 

  12. Najar AA, Manohar Naik S (2022) DDoS attack detection using MLP and random forest algorithms. Int j inf tecnol 14:2317–2327. https://doi.org/10.1007/s41870-022-01003-x

    Article  Google Scholar 

  13. Yin D, Zhang L, Yang K (2018) A DDoS attack detection and mitigation with software-defined internet of things framework. IEEE Access 6:24694–24705. https://doi.org/10.1109/ACCESS.2018.2831284

    Article  Google Scholar 

  14. Vinícius MR, Pedro RMI, Damien M, Mário MF (2021) Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms. Comput Networks 186:107792

    Article  Google Scholar 

  15. Zhang S, Chen W, Zhao J (2018) A survey of DDoS Attack and detection methods. IEEE Access 6:6902–6914

    Google Scholar 

  16. Liang T, Yue P, Jing W, Jianguo Z, Hao J, Yuchuan D (2020) A new framework for DDoS attack detection and defense in SDN environment. IEEE Access 8:161908–161919

    Article  Google Scholar 

  17. Wanda P, Marselina Endah H, Jie HJ (2020) DeepOSN: Bringing deep learning as malicious detection scheme in online social network. IAES Int J Artif Intell (IJ-AI) 9(1):146

  18. Shi D, Mudar S (2019) DDoS attack detection method based on improved KNN with the degree of DDoS attack in Software-defined networks. IEEE Access 8:5039–5048

    Google Scholar 

  19. Chin-SS, Thanh-TN, Wan-WL, Yong-LH, Mong-FH, Tsair-FL, Denis M (2022) Detection of adversarial DDoS attacks using generative adversarial networks with dual discriminators. MDPI. https://doi.org/10.3390/sym14010066

  20. Manjula HT, Mangla Neha (2023) An approach to on-stream DDoS blitz detection using machine learning algorithms. Mater Today Proceed 80(3):3492–3499. https://doi.org/10.1016/j.matpr.2021.07.280

    Article  Google Scholar 

  21. Thapanarath K, Pongpisit W (2021) DDoS attack detection using deep learning. IAES Int J Artific Intellig 2(10):328–288

    Google Scholar 

  22. Khundrakpam JS, Khelchandra T, Tanmay D (2016) Entropy-based application layer DDoS attack detection using artificial neural networks. MDPI 18:1–17

    Google Scholar 

  23. Auther M, Dharm SJ, Attlee MG (2021) Deep Neural Network (DNN) solution for real-time Detection of Distributed Denial of Service (DDoS) attacks in Software Defined Networks (SDNs). SN Compu Sci 2:107

    Article  Google Scholar 

  24. Hussain F, Abbas SG. Husnain M, Fayyaz UU, Shahzad F, Shah GA (2020) IoT DoS and DDoS attack detection using ResNet," 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan, pp. 1–6, https://doi.org/10.1109/INMIC50486.2020.9318216

  25. Wanda P, Jie HJ (2020) DeepProfile: finding fake profile in online social network using dynamic CNN. J Inf Secur Appl 52:102465

    Google Scholar 

  26. Wanda P, Jie HJ (2021) DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning. Soc Netw Anal Min 11:34

    Article  Google Scholar 

  27. Yonghao G, Kaiyue L, Zhenyang G, Yongfei W (2019) Semi-supervised K-means DDoS detection method using hybrid feature selection. IEEE Access 7:64351–64365

    Article  Google Scholar 

  28. Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7(4):3559–3570. https://doi.org/10.1109/JIOT.2020.2973176

    Article  Google Scholar 

  29. Tinubu CO, Sodiya AS, Ojesanmi OA et al (2022) DT-Model: a classification model for distributed denial of service attacks and flash events. Int J Inf Tecnol 14:3077–3087. https://doi.org/10.1007/s41870-022-00946-5

    Article  Google Scholar 

  30. Kalnoor G, Gowrishankar S (2022) A model for intrusion detection system using hidden Markov and variational Bayesian model for IoT based wireless sensor network. Int J Inf Tecnol 14:2021–2033. https://doi.org/10.1007/s41870-021-00748-1

    Article  Google Scholar 

  31. Hailye T (2021) A deep learning approach for DDoS attack detection using supervised learning. MATEC Web Conferences 348:01012

    Article  Google Scholar 

  32. Jie HJ, Wanda P (2020) “RunPool: a dynamic pooling layer for convolution neural network. Int J Comput Intellig Syst 13(1):66–76

    Article  Google Scholar 

  33. Li C, Wu Y, Yuan X, Sun Z, Wang W, Li X, Gong L (2018) Detection and defense of DDoS attack–based on deep learning in OpenFlow-based SDN. Int J Commun Syst 31(5):e3497

    Article  Google Scholar 

  34. Thapanarath K, Pongpisit W (2021) DDoS attack detection using deep learning. IAES Int J Artific Intellig 2(10):328–288

    Google Scholar 

  35. Wanda P (2022) RunMax: fake profile classification using novel nonlinear activation in CNN. Soc Netw Anal Min 12:158

    Article  Google Scholar 

Download references

Acknowledgements

This paper is conducted in the Department of Informatics, Universitas Respati Yogyakarta, Indonesia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Putra Wanda.

Ethics declarations

Conflict of interest

The authors affirm that they do not possess any competing financial interests or personal relationships that may have influenced the work reported in this paper. The corresponding author, on behalf of all authors, affirms that there is no conflict of interest involved in the research.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wanda, P., Hiswati, M.E. Belief-DDoS: stepping up DDoS attack detection model using DBN algorithm. Int. j. inf. tecnol. 16, 271–278 (2024). https://doi.org/10.1007/s41870-023-01631-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01631-x

Keywords

Navigation