Research Article
Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing
Table 2
Proposed GHLBO’s pseudocode.
| Initiate GHLBO | Input: | Adjust and | Start with member position and evaluating objective function | For = 1 to | For = 1 to | Computation of fitness using equation (13) | Stage 1: exploration | Calculation of quality by equation (14) | Calculation of participation coefficients by equations (15)–(17) | Creating hybrid leader by equation (18) | Calculating new position of member by equation (19) | Updating gradient parameter for training sample by equation (22) | New position of solution in dimension is obtained by equation (28) | Stage 2: exploration | Calculation of novel position of member using equation (29) | Updating member by equation (30) | End if; | Recalculating best optimal solution using equation (13) | Concluded | Outcome: best member solution is generated | End GHLBO |
|
|