{"id":"https://openalex.org/W4323832990","doi":"https://doi.org/10.3233/jifs-224149","title":"Novel deep learning approach for DDoS attack using elephant heard optimization algorithm along with a fuzzy classifier for rules learning","display_name":"Novel deep learning approach for DDoS attack using elephant heard optimization algorithm along with a fuzzy classifier for rules learning","publication_year":2023,"publication_date":"2023-03-10","ids":{"openalex":"https://openalex.org/W4323832990","doi":"https://doi.org/10.3233/jifs-224149"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-224149","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-224149","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064984487","display_name":"J. Caroline Misbha","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"J. Caroline Misbha","raw_affiliation_strings":["Department of Computer Science and Engineering, Arunachala College of Engineering for Women, Nagercoil, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Arunachala College of Engineering for Women, Nagercoil, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000040976","display_name":"T. Ajith Bosco Raj","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"T. Ajith Bosco Raj","raw_affiliation_strings":["Department of Electronics and Communication Engineering, PSN College of Engineering and Technology, Melathediyoor, Tirunelveli, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, PSN College of Engineering and Technology, Melathediyoor, Tirunelveli, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005071324","display_name":"G. Jiji","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Jiji","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Lord Jegannath College of Engineering and Technology, Nagercoil, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Lord Jegannath College of Engineering and Technology, Nagercoil, Tamil Nadu, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064984487"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.44919277,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"45","issue":"1","first_page":"1805","last_page":"1816"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8898224830627441},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8122262954711914},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7165621519088745},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.628353476524353},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5925765633583069},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5459132194519043},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.542733371257782},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.45749837160110474},{"id":"https://openalex.org/keywords/optimization-algorithm","display_name":"Optimization algorithm","score":0.42498475313186646},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3719048500061035},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16216909885406494},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08883574604988098}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8898224830627441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8122262954711914},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7165621519088745},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.628353476524353},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5925765633583069},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5459132194519043},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.542733371257782},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.45749837160110474},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.42498475313186646},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3719048500061035},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16216909885406494},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08883574604988098},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-224149","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-224149","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2991210281","https://openalex.org/W3005097670","https://openalex.org/W3006912911","https://openalex.org/W3021409083","https://openalex.org/W3032021129","https://openalex.org/W3036749504","https://openalex.org/W3045721717","https://openalex.org/W3102091066","https://openalex.org/W3116027269","https://openalex.org/W3136279315","https://openalex.org/W3161205829","https://openalex.org/W3164987805","https://openalex.org/W3189548043","https://openalex.org/W4211134207","https://openalex.org/W4220656594","https://openalex.org/W4225114726","https://openalex.org/W4240710547","https://openalex.org/W4282042832","https://openalex.org/W4283738204","https://openalex.org/W4285006276"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W4239662759","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2889302474"],"abstract_inverted_index":{"The":[0,83,203],"research":[1],"aims":[2],"to":[3,126,153,209,220],"provide":[4],"network":[5,45],"security":[6],"so":[7],"that":[8,24,100],"it":[9],"can":[10,227],"be":[11,210,228],"protected":[12],"from":[13],"several":[14],"attacks,":[15,218],"especially":[16],"DoS":[17],"(Denial-of-Service)":[18],"or":[19],"DDoS":[20,61,84,129,174,217],"(Distributed":[21],"Denial-of-Service)":[22],"attacks":[23,48,58],"could":[25],"at":[26],"some":[27],"point":[28],"render":[29],"the":[30,37,53,92,108,120,128,138,141,155,168,173,177,181,189,196,207,231,236,239],"server":[31],"inoperable.":[32],"Security":[33],"is":[34,59,76,89,117,193],"one":[35],"of":[36,44,52,87,105,164,170,172,238],"main":[38],"obstacles.":[39],"There":[40],"are":[41,124,184],"a":[42,60,103,134,161,211],"lot":[43,104],"risks":[46],"and":[47,56,119,166,225],"available":[49],"today.":[50],"One":[51],"most":[54],"common":[55],"disruptive":[57],"attack.":[62],"In":[63,107,137],"this":[64],"study,":[65],"upgraded":[66],"deep":[67,112,143,198],"learning":[68,99,144,157,199],"Elephant":[69,145,200],"Herd":[70,146,201],"Optimization":[71,147],"with":[72,102,133,148,160],"random":[73,149],"forest":[74,150],"classifier":[75,151],"employed":[77],"for":[78,96,214],"early":[79],"DDos":[80],"attack":[81,130,190],"detection.":[82],"dataset\u2019s":[85],"number":[86,169],"characteristics":[88,132],"decreased":[90],"by":[91],"proposed":[93,142,204],"IDN-EHO":[94],"method":[95,213],"classifying":[97],"data":[98,122,156,165],"works":[101],"data.":[106],"feature":[109],"extraction":[110],"stage,":[111,140],"neural":[113],"networks":[114],"(DNN)":[115],"approach":[116],"used,":[118],"classified":[121],"packages":[123],"compared":[125],"return":[127],"traffic":[131],"significant":[135],"percentage.":[136],"classification":[139],"used":[152,185],"classify":[154],"which":[158],"deal":[159],"huge":[162],"amount":[163],"minimise":[167],"features":[171,183],"dataset.":[175],"During":[176],"detection":[178,191],"step,":[179],"when":[180],"extracted":[182],"as":[186],"input":[187],"features,":[188],"model":[192],"trained":[194],"using":[195,230],"improved":[197],"Optimization.":[202],"framework":[205],"has":[206],"potential":[208],"promising":[212],"identifying":[215],"unidentified":[216],"according":[219,234],"experiments.":[221,240],"99%":[222],"recall,":[223],"precision,":[224],"accuracy":[226],"attained":[229],"suggested":[232],"strategy,":[233],"on":[235],"findings":[237]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
