Research Article
Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing
Table 2
Proposed GHLBO’s pseudocode.
| | Initiate GHLBO | | Input: | | Adjust and | | Start with member position and evaluating objective function | | For = 1 to | | For = 1 to | | Computation of fitness using equation (13) | | Stage 1: exploration | | Calculation of quality by equation (14) | | Calculation of participation coefficients by equations (15)–(17) | | Creating hybrid leader by equation (18) | | Calculating new position of member by equation (19) | | Updating gradient parameter for training sample by equation (22) | | New position of solution in dimension is obtained by equation (28) | | Stage 2: exploration | | Calculation of novel position of member using equation (29) | | Updating member by equation (30) | | End if; | | Recalculating best optimal solution using equation (13) | | Concluded | | Outcome: best member solution is generated | | End GHLBO |
|
|