Loading…
Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology
The attack named Distributed Denial of Service (DDoS) that takes place in the large blockchain network requires an efficient and robust attack detection and prevention mechanism for authenticated access. Blockchain is a distributed network in which the attacker tries to hack the network by utilizing...
Saved in:
Published in: | Transactions on emerging telecommunications technologies 2023-04, Vol.34 (4), p.n/a |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The attack named Distributed Denial of Service (DDoS) that takes place in the large blockchain network requires an efficient and robust attack detection and prevention mechanism for authenticated access. Blockchain is a distributed network in which the attacker tries to hack the network by utilizing all the resources with the application of enormous requests. Several methods like Rival Technique, filter modular approach and so on, were developed to detect and prevent the DDoS attack in the blockchain; still, detection accuracy is a challenging task. Hence, this research introduces an efficient technique using optimization‐based deep learning by considering the blockchain network and smart contract for the detection and prevention of DDoS attacks. Based on the user request, the traffic is analyzed, and the verification using the smart contract is made to find the authenticated user. After the verification, the response is provided for the authenticated user, and the suspicious traffic is utilized for the detection of DDoS attacks using the Poaching Raptor Optimization‐based deep neural network (Poaching Raptor‐based DNN), in which the classifier is tuned using the proposed optimization algorithm to reduce the training loss. The proposed algorithm is designed by hybridizing the habitual practice of the raptor by considering the concurring behavior, hunting style along with poaching behavior of the Lobo to enhance the detection accuracy. After the attack detection, the nonattacker is responded, and the attacker is prevented by entering the IP/MAC address in the logfile. The performance of the proposed method is evaluated in terms of recall, precision, FPR, and accuracy and obtained the values of 96.3%, 98.22%, 3.33%, and 95.12%, respectively.
Proposed poaching raptor optimization algorithm: The proposed poaching raptor optimization is developed by hybridizing the habitual practice of the raptor by considering the concurring behavior and its hunting style along with the poaching behavior of the Lobo. Proposed DDoS attack detection: The proposed poaching raptor‐based DNN is utilized to detect the DDoS attack, Prevention of DDoS attack: The prevention of the DDoS attack is employed by discarding the response and the AP/MAC address is stored in the Log file. |
---|---|
ISSN: | 2161-3915 2161-3915 |
DOI: | 10.1002/ett.4729 |