Research Article

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

Table 2

Proposed GHLBO’s pseudocode.

Initiate GHLBO
Input:
Adjust and
Start with member position and evaluating objective function
For  = 1 to
For  = 1 to
Computation of fitness using equation (13)
Stage 1: exploration
Calculation of quality by equation (14)
Calculation of participation coefficients by equations (15)–(17)
 Creating hybrid leader by equation (18)
Calculating new position of member by equation (19)
Updating gradient parameter for training sample by equation (22)
 New position of solution in dimension is obtained by equation (28)
Stage 2: exploration
 Calculation of novel position of member using equation (29)
 Updating member by equation (30)
End if;
Recalculating best optimal solution using equation (13)
Concluded
Outcome: best member solution is generated
End GHLBO