Loading…
A Novel Hybrid Deep Learning Approach to Code Generation Aimed at Mitigating the Real-Time Network Attack in the Mobile Experiment Via GRU-LM and Word2vec
As the use of devices in mobile environments increases, network attacks such as DDoS have a malicious attempt to flood the network's regular traffic to overload the target and surrounding infrastructure. This research proposed machine learning and deep learning approaches to dealing with DDoS a...
Saved in:
Published in: | Mobile information systems 2022-09, Vol.2022, p.1-11 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | As the use of devices in mobile environments increases, network attacks such as DDoS have a malicious attempt to flood the network's regular traffic to overload the target and surrounding infrastructure. This research proposed machine learning and deep learning approaches to dealing with DDoS attacks, and the results are described as follows. First, this research successfully detected DDoS attacks through an LGBM with a 100% accuracy score. Second, the proposed model (GRU-LM), which consists of a trained Word2vec layer with the Python dataset, is far more effective than the standard GRU model. Since Python is quite similar to English, language model-based GRU yields superior results. Various preprocessing steps were performed through the NLTK package, and each number was assigned to the tokenized one for constructing the GRU language model. The result reveals that the proposed model achieved an accuracy score of 87% for predicting the following words in the source code, while the rest achieved below 30% accuracy. This conclusion is significant because its relatively simple and light structure overcomes tradeoff problems between time and accuracy and is adaptable to the mobile setting. Discovering traffic patterns for the underlying data of DDOS assaults and retrieving them using statistical data analysis is the value of this research. Furthermore, since public cloud application vulnerability assaults are rising due to expanding cloud infrastructure, this finding could be used in such attacks. |
---|---|
ISSN: | 1574-017X 1875-905X |
DOI: | 10.1155/2022/3999868 |