Hybrid Machine Learning Model for Feature Selection in DDoS Attack Detection in Cloud Environments Using Convolutional Neural Networks and Genetic Algorithms
DOI:
https://doi.org/10.31185/wjps.616Keywords:
DDoS Detection, Convolutional Neural Networks, Genetic Algorithm, Cloud Security, Feature Selection, Cybersecurity, Real-Time Detection, Network Intrusion Detection Systems.Abstract
As cloud environments are very vulnerable to such threats and are in focus for sophisticated cyberattacks, including the DDoS attack, there is a rising trend in distributed networks as the popularity of cloud computing increases. These attacks usually employ techniques like botnets, spoofing, and multi-vector attacks, and therefore are making becomes increasingly difficult to detect. This paper also presents an adaptive hybrid AI model that uses CNN and GA to select the features of the best option and the detection of DDoS attack. Thus the GA is applied to optimize the feature selection over network traffic and the CNN is then used to learn and extract the spatial and temporal patterns. Subsequently, for testing, our approach undergoes normalization, dimensionality reduction, and feature extraction before the model is tested on CIC-IDS-2017 and CIC-Darknet-2020 datasets. We present a new AI model that performs better than pure AI models like SVM, random forests, and decision trees and surpasses other hybrid methods like HMM and LSTM with a 99.98% detection rate. Results have shown the effectiveness of the proposed model in terms of scalability, reliability and operational ability to work in real time, which can further implied that it is a potential solution for DDoS attack in cloud. In future work, we plan to enhance this framework to include a wider array of attack methods as well as refine the efficiency of the algorithm for use in real time applications with limited computing capabilities.
References
O. Bamasag, A. Alsaeedi, A. Munshi, D. Alghazzawi, S. Alshehri, and A. Jamjoom, “Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing,” PeerJ Comput. Sci., vol. 7, p. e814, 2022.
E. M. T. A. Alsaadi, S. M. Fayadh, and A. Alabaichi, “A review on security challenges and approaches in the cloud computing,” in AIP Conference Proceedings, 2020, vol. 2290, no. 1.
N. Bindra and M. Sood, “Detecting DDoS attacks using machine learning techniques and contemporary intrusion detection dataset,” Autom. Control Comput. Sci., vol. 53, no. 5, pp. 419–428, 2019.
M. Darwish, A. Ouda, and L. F. Capretz, “Cloud-based DDoS attacks and defenses,” in International Conference on Information Society (i-Society 2013), 2013, pp. 67–71.
E. Alsadi, N. K. El Abbadi, and T. A. Alsadi, “Scrutiny of methods for image detection and recognition of different species of animals,” Int. J. Recent Technol. Eng., vol. 8, no. 3s3, pp. 151–160, 2019.
E. G. Abdulkadhim, M. S. Al-Shemarry, and E. M. T. A. Alsaadi, “An efficient algorithm for covert contacting in IoT,” in AIP Conference Proceedings, 2024, vol. 3097, no. 1.
V. Galyaev, E. Zykova, D. Repin, and D. Bokov, “Recent Trends in Development of DDoS Attacks and Protection Systems Against Them.,” Int. J. Netw. Secur., vol. 21, no. 4, pp. 635–647, 2019.
M. Jonker, A. Sperotto, and A. Pras, “DDoS Mitigation: A measurement-based approach,” in NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 2020, pp. 1–6.
A. Khattak et al., “An efficient supervised machine learning technique for forecasting stock market trends,” Inf. Knowl. Internet Things, pp. 143–162, 2022.
G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, “DDoS attacks in cloud computing: Issues, taxonomy, and future directions,” Comput. Commun., vol. 107, pp. 30–48, 2017.
A. Khattak, M. Z. Asghar, M. Ali, and U. Batool, “An efficient deep learning technique for facial emotion recognition,” Multimed. Tools Appl., vol. 81, no. 2, pp. 1649–1683, 2022.
K. Yang, S. Kpotufe, and N. Feamster, “Feature extraction for novelty detection in network traffic,” arXiv Prepr. arXiv2006.16993, 2020.
S. M. Fayadh, E. M. T. A. Alsaadi, and H. Hallawi, “Application of smartphone in recognition of human activities with machine learning,” Indones. J. Electr. Eng. Comput. Sci., vol. 30, no. 2, pp. 860–869, 2023.
A. Makuvaza, D. S. Jat, and A. M. Gamundani, “Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs),” SN Comput. Sci., vol. 2, no. 2, p. 107, 2021.
Korzun, D.; Balandina, E.; Kashevnik, A.; Balandin, S.; Viola, F. Ambient Intelligence Services in IoT Environments: Emerging Research and Opportunities; IGI Global: Hershey, PA, USA 2019.
J. L. Leevy and T. M. Khoshgoftaar, “A survey and analysis of intrusion detection models based on cse-cic-ids2018 big data,” Journal of Big Data, vol. 7, no. 1, pp. 1–19, 2020.
Ghaleb, Ekhlass. "Design and Optimization of Tourism Information Management System Based on Artificial Intelligence." Wasit Journal for Pure sciences 3.3 (2024): 101-111.
A. E. R. ElSaid, J. Karns, Z. Lyu, D. Krutz, A. Ororbia, and T. Desell, “Improving neuroevolutionary transfer learning of deep recurrent neural networks through network-aware adaptation,” in Proceedings of the 2020 Genetic and Evolutionary Computation Conference, pp. 315–323, Prague, Czech Republic, March 2020.
Kushwah, G. S., &Ranga, V. (2021). Optimized extreme learning machine for detecting DDoS attacks in cloud computing. Computers & Security, 105, 102260. https://doi.org/10.1016/j.cose.2021.102260
Manimurugan, S., Al-Mutairi, S., Aborokbah, M. M., Chilamkurti, N., Ganesan, S., &Patan, R. (2020). Effective attack detection in Internet of Medical Things smart environment using a deep belief neural network. IEEE Access, 8, 77396–77404. https://doi.org/10.1109/ACCESS.2020.2990159
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Sabah Mohammed Fayadh

This work is licensed under a Creative Commons Attribution 4.0 International License.