Research Article

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

Table 1

Review on existing methods.

ReferencesMethodsAdvantagesDisadvantages

Velliangiri et al. [2]TEHO-DBN(i) It identified the attack at earlier stages itself(i) It required more computational time
Arul and Punidha [4]SD-LVQ(i) It reduced the detection strategies of the DDoS-encrypted cross-site attack(i) Difficult to process a large amount of data
Doriguzzi-Corin et al. [10]LUCID(i) Less overhead processing and minimal time of detection(i) Time of convergence and accuracy were low
Agarwal et al. [15]FS-WOA(i) It avoided DoS attack entry in a big-scale industry(i) This method lacks in generating individual instantiations to detect novel attacks
Kushwaha and Ranga [3]SaE-ELM-Ca(i) It determined appropriate hidden neurons number to improvise model’s learning capability(i) It failed to utilize multiple connections for testing
Alduailij et al. [1]MI and RFF(i) It reduced miss classification error(i) It failed to examine with DL-based detection
Alqarni [9]Ensemble approach(i) Limited the size of the feature and dataset producing higher performance(i) Time of execution was high
Cil et al. [6]Feed forward-based DNN(i) It attained accurate and fast results within a shorter period of time(i) It preferred the compulsory training process as the large number of packages was contained in the dataset
Bovenzi et al. [16]M2-DAE(i) It had high efficiency and flexibility(i) The attack classes were not evaluated
Guarino et al. [17]Machine learning(i) It obtained high F-measure(i) More datasets were not considered