Skip to main content

Advertisement

Log in

An evolutionary KNN model for DDoS assault detection using genetic algorithm based optimization

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Distributed Denial of Service (DDoS) attacks continue to pose a significant threat to network infrastructures, exploiting vulnerabilities within existing security protocols and disrupting the seamless availability of online services. The intricate interconnections of nodes within computer networks contribute to the dynamic structure of this environment, complicating efforts to establish a secure and productive user experience. Effectively mitigating DDoS attacks in this complex networked setting remains a challenge. While current strategies primarily rely on anomaly detection and signature-based techniques, utilizing statistical analysis and predefined patterns to identify and thwart attacks, none have consistently demonstrated efficacy or reliability. Consequently, there is a compelling need for advancements in security mechanisms to address DDoS threats more effectively. This research introduces an innovative and highly efficient approach that incorporates various classification algorithms, including Random Forest, Decision Tree, Gradient Boosting, Linear SVM, Logistics, K-nearest neighbors (KNN), and AdaBoost, for DDoS attack detection. The performance of these machine learning classifiers is evaluated using key metrics such as accuracy, recall, F1-score, and precision. Remarkably, experimental results reveal outstanding accuracy rates, with Random Forest achieving the highest accuracy in detecting attacks. Additionally, a genetic algorithm is employed to select optimal features from the dataset, further enhancing the performance of the classifiers. This results in a notable 25% increase in accuracy, surpassing AdaBoost and Logistics, with K-nearest neighbors emerging as the top performer in terms of accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The authors confirm that the data supporting the findings of this study are available within the article.

References

  1. Bindra N, Sood M (2019) Detecting DDoS attacks using machine learning techniques and contemporary intrusion detection dataset. Autom Control Comput Sci 53(5):419–428. https://doi.org/10.3103/S0146411619050043

    Article  Google Scholar 

  2. Pei J, Chen Y, Ji W (2019) A DDoS Attack detection method based on machine learning. J Phys Conf Ser 1237(3):032040. https://doi.org/10.1088/1742-6596/1237/3/032040

    Article  Google Scholar 

  3. Onyema EM, Dinar AE, Ghouali S, Merabet B, Merzougui R, Feham M (2022) Cyber threats, attack strategy, and ethical hacking in telecommunications systems. In springerem onyema, ae dinar, s ghouali, b merabet, r merzougui, m fehamsecurity and privacy in cyberspace 2022•Springer 25–45. https://doi.org/10.1007/978-981-19-1960-2_2

  4. Michael Onyema E, Chinecherem Deborah E, Ugboaja S, Utibe Edmond V. Cybersecurity Awareness Among Undergraduate Students in Enugu Nigeria.” [Online]. Available: https://www.researchgate.net/publication/355716927

  5. Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. Proc Int Carnahan Conf Sec Technol. https://doi.org/10.1109/CCST.2019.8888419

  6. Afriyie RK, Asante M, Onyema EM (2020) Implementing morpheme-based compression security mechanism in distributed systems. Int J Innov Res Dev 9(2) https://doi.org/10.24940/ijird/2020/v9/i2/jan20092

  7. Agrawal N, Tapaswi S (2019) Defense mechanisms against DDoS attacks in a cloud computing environment: state-of-the-art and research challenges. IEEE Commun Surv Tutorials 21(4):3769–3795. https://doi.org/10.1109/COMST.2019.2934468

    Article  Google Scholar 

  8. 2020-Q1_AWS_Shield_TLR

  9. Famous DDoS Attacks | Biggest DDoS Attacks | Cloudflare. Accessed: Dec. 25, 2023. [Online]. Available: https://www.cloudflare.com/learning/ddos/famous-ddos-attacks/

  10. Patil N (2022) DDoS attack detection and botnet prevention using machine learning. Int Res J Eng Technol (IRJET) 9(11)

  11. Ullah I, Mahmoud QH (2020) A technique for generating a botnet dataset for anomalous activity detection in IoT networks. In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC) IEEE 134–140. https://doi.org/10.1109/SMC42975.2020.9283220

  12. Saini PS, Behal S, Bhatia S (2020) Detection of DDoS attacks using machine learning algorithms. Proceedings of the 7th International Conference on Computing for Sustainable Global Development, INDIACom 2020, 16–21. https://doi.org/10.23919/INDIACOM49435.2020.9083716

  13. Khalaf BA, Mostafa SA, Mustapha A, Mohammed MA, Abduallah WM (2019) Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 7:51691–51713. https://doi.org/10.1109/ACCESS.2019.2908998

    Article  Google Scholar 

  14. Verma A, Ranga V (2020) Machine learning based intrusion detection systems for IoT applications. Wirel Pers Commun 111(4):2287–2310. https://doi.org/10.1007/S11277-019-06986-8

    Article  Google Scholar 

  15. Eswari DS, Lakshmi PV (2021) A survey on detection of ddos attacks using machine learning approaches. Turk J Comput Math Ed (TURCOMAT) 12(11):4923–4931. https://doi.org/10.17762/TURCOMAT.V12I11.6671

    Article  Google Scholar 

  16. Sanmorino A (2019) A study for DDOS attack classification method. J Phys Conf Ser 1175:012025. https://doi.org/10.1088/1742-6596/1175/1/012025

    Article  Google Scholar 

  17. Mohammadi S, Babagoli M (2021) A hybrid modified grasshopper optimization algorithm and genetic algorithm to detect and prevent DDoS attacks. Int J Eng 34(04):811–824. https://doi.org/10.5829/ije.2021.34.04a.07

    Article  Google Scholar 

  18. Lv Y, Duan Y, Kang W, Li Z, Wang F-Y (2014) Traffic flow prediction with big data: A deep learning approach. IEEE Trans Intell Transp Syst 16(2):1–9. https://doi.org/10.1109/TITS.2014.2345663

    Article  Google Scholar 

  19. Zhu BB, Yan J (2013) Towards new security primitives based on hard AI problems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8263 LNCS, 3–10. https://doi.org/10.1007/978-3-642-41717-7_2

  20. Yoon M (2010) Using whitelisting to mitigate DDoS attacks on critical internet sites. IEEE Commun Mag 48(7):110–115. https://doi.org/10.1109/MCOM.2010.5496886

    Article  Google Scholar 

  21. Yu J, Fang C, Lu L, Li Z (2010) Mitigating application layer distributed denial of service attacks via effective trust management. IET Commun 4(16):1952–1962. https://doi.org/10.1049/IET-COM.2009.0809

    Article  Google Scholar 

  22. Beitollahi H, Deconinck G (2014) ConnectionScore: A statistical technique to resist application-layer DDoS attacks. J Ambient Intell Humaniz Comput 5(3):425–442. https://doi.org/10.1007/S12652-013-0196-5

    Article  Google Scholar 

  23. Maity P, Saxena S, Srivastava S, Sahoo KS, Pradhan AK, Kumar N (2022) An effective probabilistic technique for DDoS detection in openflow controller. IEEE Syst J 16(1):1345–1354. https://doi.org/10.1109/JSYST.2021.3110948

    Article  ADS  Google Scholar 

  24. Patil A, Kshirsagar D (2020) Towards feature selection for detection of DDoS attack. Adv Intell Syst Comput 1025:215–223. https://doi.org/10.1007/978-981-32-9515-5_21/COVER

    Article  Google Scholar 

  25. Kunang YN, Nurmaini S, Stiawan D, Zarkasi A, Jasmir F (2019) Automatic features extraction using autoencoder in intrusion detection system. Proc 2018 Int Conf Electr Eng Comput Sci ICECOS 2018 219–224. https://doi.org/10.1109/ICECOS.2018.8605181

  26. Can DC, Le HQ, Ha QT (2021) Detection of distributed denial of service attacks using automatic feature selection with enhancement for imbalance dataset. Lecture Notes Comput Sci (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12672(LNAI):386–398. https://doi.org/10.1007/978-3-030-73280-6_31/COVER

    Article  Google Scholar 

  27. Nguyen TT, Reddi VJ (2021) Deep reinforcement learning for cyber security. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/TNNLS.2021.3121870

    Article  Google Scholar 

  28. Alzaylaee MK, Yerima SY, Sezer S (2020) DL-Droid: Deep learning based android malware detection using real devices. Comput Secur 89:101663. https://doi.org/10.1016/J.COSE.2019.101663

    Article  Google Scholar 

  29. Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: A Survey. Appl Sci 9(20):4396. https://doi.org/10.3390/APP9204396

    Article  Google Scholar 

  30. Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J (2022) RSM analysis based cloud access security broker: A systematic literature review. Cluster Comput 25(5):3733–3763. https://doi.org/10.1007/s10586-022-03598-z

    Article  PubMed  PubMed Central  Google Scholar 

  31. Hassan M, Mebarek-Oudina F, Faisal A, Ghafar A, Ismail AI (2022) Thermal energy and mass transport of shear thinning fluid under effects of low to high shear rate viscosity. Int J Thermofluids 15:100176. https://doi.org/10.1016/J.IJFT.2022.100176

    Article  Google Scholar 

  32. Farhan M et al (2020) Implementation of the one-step one-hybrid block method on the nonlinear equation of a circular sector oscillator. Comput Math Model 31(1):116–132. https://doi.org/10.1007/S10598-020-09480-0/METRICS

    Article  MathSciNet  Google Scholar 

  33. Guangnian X, Qiongwen L, Anning N, Zhang C (2023) Research on carbon emissions of public bikes based on the life cycle theory. Transportation Letters 15(4):278–295. https://doi.org/10.1080/19427867.2022.2123142

    Article  Google Scholar 

  34. Sahu SK, Mohapatra DP, Rout JK, Sahoo KS, Luhach AK (2021) An ensemble-based scalable approach for intrusion detection using big data framework. Big Data 9(4):303–321. https://doi.org/10.1089/BIG.2020.0201

    Article  PubMed  Google Scholar 

  35. Feng Y, Li J, Nguyen T (2020) Application-layer DDoS defense with reinforcement learning. 2020 IEEE/ACM 28th International Symposium on Quality of Service, IWQoS 2020. https://doi.org/10.1109/IWQOS49365.2020.9213026

  36. Sudar KM, Beulah M, Deepalakshmi P, Nagaraj P, Chinnasamy P (2021) Detection of distributed denial of service attacks in sdn using machine learning techniques. 2021 International Conference on Computer Communication and Informatics, ICCCI 2021. https://doi.org/10.1109/ICCCI50826.2021.9402517

  37. Alghazzawi D, Bamasaq O, Ullah H, Asghar MZ (2021) Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection. Appl Sci 11:11634. https://doi.org/10.3390/APP112411634

    Article  CAS  Google Scholar 

  38. Zeeshan M et al (2022) Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT data-sets. IEEE Access 10:2269–2283. https://doi.org/10.1109/ACCESS.2021.3137201

    Article  Google Scholar 

  39. Ismail et al (2022) A Machine learning-based classification and prediction technique for DDoS attacks. IEEE Access 10:21443–21454. https://doi.org/10.1109/ACCESS.2022.3152577

    Article  Google Scholar 

  40. Yungaicela-Naula NM, Vargas-Rosales C, Perez-Diaz JA (2021) SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access 9:108495–108512. https://doi.org/10.1109/ACCESS.2021.3101650

    Article  Google Scholar 

  41. Shieh CS, Lin WW, Nguyen TT, Chen CH, Horng MF, Miu D (2021) Detection of unknown ddos attacks with deep learning and gaussian mixture model. Appl Sci (Switzerland) 11(11):5213. https://doi.org/10.3390/app11115213

    Article  CAS  Google Scholar 

  42. Chandan RR et al. (2023) Genetic Algorithm and Machine Learning. 167–182. https://doi.org/10.4018/978-1-6684-5656-9.ch009

  43. Zhu WL et al (2021) GeneticKNN: a weighted KNN approach supported by genetic algorithm for photometric redshift estimation of quasars. Res Astron Astrophys 21(1):017. https://doi.org/10.1088/1674-4527/21/1/17

    Article  ADS  MathSciNet  CAS  Google Scholar 

  44. APA-DDoS Dataset | Kaggle. Accessed: Feb. 26, 2023. [Online]. Available: https://www.kaggle.com/datasets/yashwanthkumbam/apaddos-dataset

  45. Nyo MT, Mebarek-Oudina F, Hlaing SS, Khan NA (2022) Otsu’s thresholding technique for MRI image brain tumor segmentation. Multimed Tools Appl 81(30):43837–43849. https://doi.org/10.1007/S11042-022-13215-1/METRICS

    Article  Google Scholar 

  46. Shen D, Saab SS (2021) Noisy-output-based direct learning tracking control with Markov nonuniform trial lengths using adaptive gains. IEEE Trans Autom Control 67(8):4123–4130

    Article  MathSciNet  Google Scholar 

  47. Sayour MH, Kozhaya SE, Saab SS (2022) Autonomous robotic manipulation: Real-time, deep-learning approach for grasping of unknown objects. J Robotics 2022:1

    Article  Google Scholar 

  48. Shen D, Huo N, Saab SS (2021) A probabilistically quantized learning control framework for networked linear systems. IEEE Trans Neural Netw Learning Syst 33(12):7559–7573

    Article  MathSciNet  Google Scholar 

  49. Saab SS, Jaafar RH (2021) A proportional-derivative-double derivative controller for robot manipulators. Int J Control 94(5):1273–1285

    Article  MathSciNet  Google Scholar 

  50. Saab SS, Shen D, Orabi M, Kors D, Jaafar RH (2021) Iterative learning control: Practical implementation and automation. IEEE Trans Industr Electron 69(2):1858–1866

    Article  Google Scholar 

  51. Dayan F, Rafiq M, Ahmed N, Baleanu D, Raza A, Ahmad MO, Iqbal M (2022) Design and numerical analysis of fuzzy nonstandard computational methods for the solution of rumor based fuzzy epidemic model. Physica A 600:127542

    Article  MathSciNet  Google Scholar 

  52. Kouatli I (2020) The use of fuzzy logic as augmentation to quantitative analysis to unleash knowledge of participants’ uncertainty when filling a survey: case of cloud computing. IEEE Trans Knowl Data Eng 34(3):1489–1500

    Article  Google Scholar 

  53. Ben Abdallah S, Kouatli I (2020) Fuzzy volatility of project option value based on trapezoidal membership functions. In intelligent and fuzzy techniques in big data analytics and decision making: Proceedings of the INFUS 2019 Conference, Istanbul, Turkey, July 23–25, 2019 (1307–1314). Springer International Publishing

  54. Abdallah SB, Kouatli I (2018) Fuzzy volatility effect on major projects timing. In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (1–6). IEEE

  55. Azadeh A, Kalantari M, Ahmadi G, Eslami H (2019) A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption. Constr Innov 19(1):71–88

    Article  Google Scholar 

  56. Taheri R, Kabuli M, Vryzas Z (2020) Fracturing and permeability enhancement with laser technology employing fuzzy logic. J Petrol Sci Eng 188:106830

    Article  CAS  Google Scholar 

  57. Kouatli I (2018) Fuzzimetric employee evaluations system (FEES): A multivariable-modular approach. J Intell Fuzzy Syst 35(4):4717–4729

    Article  Google Scholar 

  58. Salloum G, Tekli J (2021) Automated and personalized nutrition health assessment, recommendation, and progress evaluation using fuzzy reasoning. Int J Hum Comput Stud 151:102610

    Article  Google Scholar 

  59. Abboud R, Tekli J (2020) Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition. Soft Comput 24(13):9875–9925

    Article  Google Scholar 

  60. Ghanem CR, Gereige EN, Bou Nader WS, Mansour CJ (2022) Stirling system optimization for series hybrid electric vehicles. Proc Inst Mech Eng, Part D: J Automobile Eng 236(2–3):407–423

    Article  CAS  Google Scholar 

  61. Abbas N, Fawaz W, Sharafeddine S, Mourad A, Abou-Rjeily C (2022) SVM-based task admission control and computation offloading using lyapunov optimization in heterogeneous MEC network. IEEE Trans Netw Serv Manage 19(3):3121–3135

    Article  Google Scholar 

  62. Marrouche W, Farah R, Harmanani HM (2018) A multiobjective optimization method for the SOC test time, TAM, and power optimization using a strength pareto evolutionary algorithm. In Information Technology-New Generations: 14th International Conference on Information Technology (685–695). Springer International Publishing

  63. Yusuf A, Sulaiman TA, Alshomrani AS, Baleanu D (2022) Optical solitons with nonlinear dispersion in parabolic law medium and three-component coupled nonlinear Schrödinger equation. Opt Quant Electron 54(6):390

    Article  Google Scholar 

  64. Issa JS (2022) A nonlinear absorber for the reflection of travelling waves in bars. Nonlinear Dyn 108(4):3279–3295

    Article  Google Scholar 

  65. Tiwari AK, Bathia D, Bouri E, Gupta R (2021) Investor sentiment connectedness: evidence from linear and nonlinear causality approaches. Annals of Financial Economics 16(04):2150016

    Article  Google Scholar 

  66. Chamoun S, Nour C (2021) A nonlinear ϕ0-convexity result for the bilateral minimal time function

  67. Kassis MT, Tannir D, Toukhtarian R, Khazaka R (2019) Moments-based sensitivity analysis of x-parameters with respect to linear and nonlinear circuit components. In 2019 IEEE 28th Conference on Electrical Performance of Electronic Packaging and Systems (EPEPS) (1–3). IEEE

  68. Saab SS, Saab KK (2019) Shuffled linear regression with erroneous observations. In 2019 53rd Annual Conference on Information Sciences and Systems (CISS) (1–6) IEEE

  69. Bouri E, Gupta R, Wang S (2022) Nonlinear contagion between stock and real estate markets: International evidence from a local Gaussian correlation approach. Int J Financ Econ 27(2):2089–2109

    Article  Google Scholar 

  70. Hussain M, Kaassamani S, Auguste T, Boutu W, Gauthier D, Kholodtsova M,... Merdji H (2021) Spectral control of high order harmonics through non-linear propagation effects. Appl Physics Lett 119(7)

  71. Haraty RA, Mansour N, Zeitunlian H (2018) Metaheuristic algorithm for state-based software testing. Appl Artif Intell 32(2):197–213

    Article  Google Scholar 

  72. Tarhini A, Harfouche A, De Marco M (2022) Artificial intelligence-based digital transformation for sustainable societies: the prevailing effect of COVID-19 crises. Pacific Asia J Assoc Inf Syst 14(2):1

    Google Scholar 

  73. Nour C, Takche J (2020) A general result about inner regularization of sets

  74. Chicha E, Bouna BA, Nassar M, Chbeir R, Haraty RA, Oussalah M, Alraja MN (2021) A user-centric mechanism for sequentially releasing graph datasets under blowfish privacy. ACM Trans Int Technol (TOIT) 21(1):1–25

    Article  Google Scholar 

  75. Mourad A, Tout H, Wahab OA, Otrok H, Dbouk T (2020) Ad hoc vehicular fog enabling cooperative low-latency intrusion detection. IEEE Internet Things J 8(2):829–843

    Article  Google Scholar 

  76. AbdulRahman S, Tout H, Mourad A, Talhi C (2020) FedMCCS: Multicriteria client selection model for optimal IoT federated learning. IEEE Internet Things J 8(6):4723–4735

    Article  Google Scholar 

  77. Rahman SA, Tout H, Talhi C, Mourad A (2020) Internet of things intrusion detection: Centralized, on-device, or federated learning? IEEE Network 34(6):310–317

    Article  Google Scholar 

  78. Khabbaz M, Assi C, Sharafeddine S (2021) Multihop V2U path availability analysis in UAV-assisted vehicular networks. IEEE Internet Things J 8(13):10745–10754

    Article  Google Scholar 

  79. Sorkhoh I, Ebrahimi D, Assi C, Sharafeddine S, Khabbaz M (2020) An infrastructure-assisted workload scheduling for computational resources exploitation in the fog-enabled vehicular network. IEEE Internet Things J 7(6):5021–5032

    Article  Google Scholar 

  80. Arafeh M, El Barachi M, Mourad A, Belqasmi F (2019) A blockchain based architecture for the detection of fake sensing in mobile crowdsensing. In 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech) (1–6) IEEE

  81. Haraty RA, Boukhari B, Kaddoura S (2021) An effective hash-based assessment and recovery algorithm for healthcare systems. Arab J Sci Eng 1–14

  82. Yunis M, Markarian C, El-Kassar AN (2020) A conceptual model for sustainable adoption of ehealth: Role of digital transformation culture and healthcare provider’s readiness. Proc IMCIC 17

  83. Helwan A, Ma’aitah MKS, Uzelaltinbulat S, Altobel MZ, Darwish M (2021) Gaze prediction based on convolutional neural network. In International conference on emerging technologies and intelligent systems (215–224). Cham: Springer International Publishing

  84. Gerges F, Shih F, Azar D (2021) Automated diagnosis of acne and rosacea using convolution neural networks. In Proceedings of the 2021 4th International Conference on Artificial Intelligence and Pattern Recognition (607–613)

  85. Abbas N, Nasser Y, Shehab M, Sharafeddine S (2021) Attack-specific feature selection for anomaly detection in software-defined networks. In 2021 3rd IEEE middle east and north africa communications conference (menacomm) (142–146). IEEE

  86. Tarhini A, Danach K, Harfouche A (2022) Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers. Ann Oper Res 1–22:549

    Article  MathSciNet  Google Scholar 

  87. Zhou Z, Li Y, Li J, Yu K, Kou G, Wang M, Gupta BB (2022) Gan-siamese network for cross-domain vehicle re-identification in intelligent transport systems. IEEE Trans Netw Sci Eng

  88. Kfouri R (2023) A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation (Doctoral dissertation. Lebanese American University

    Google Scholar 

  89. Rehan M, Javed AR, Kryvinska N, Gadekallu TR, Srivastava G, Jalil Z (2023) Supply chain management using an industrial internet of things hyperledger fabric network. Human-centric computing and information sciences, 13

  90. Zhang Z, Jiang H, Shen D, Saab SS (2024) Data-driven learning control algorithms for unachievable tracking problems. IEEE/CAA J Automatica Sinica 11(1):1–14

    Article  Google Scholar 

  91. Saab S Jr, Phoha S, Zhu M, Ray A (2022) An adaptive polyak heavy-ball method. Mach Learn 111(9):3245–3277

    Article  MathSciNet  Google Scholar 

  92. Saab S Jr, Saab K, Phoha S, Zhu M, Ray A (2022) A multivariate adaptive gradient algorithm with reduced tuning efforts. Neural Netw 152:499–509

    Article  PubMed  Google Scholar 

  93. Saab S Jr, Fu Y, Ray A, Hauser M (2022) A dynamically stabilized recurrent neural network. Neural Process Lett 54(2):1195–1209

    Article  Google Scholar 

  94. Kozhaya SE, Haidar-Ahmad JA, Abdallah AA, Kassas ZM, Saab SS (2021) Comparison of neural network architectures for simultaneous tracking and navigation with LEO satellites. In Proceedings of the 34th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2021) (2507–2520)

Download references

Funding

This project is partly funded by National Research Council of Thailand (NRCT), Project no. N42A660902.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Dhiman.

Ethics declarations

Ethics approval and consent to participate

This article does not contain any studies with human participants or animals performed by any of the authors.

Disclosure of potential conflicts of interest

None.

Research involving human participants and/or animals

None.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rizvi, F., Sharma, R., Sharma, N. et al. An evolutionary KNN model for DDoS assault detection using genetic algorithm based optimization. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18744-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18744-5

Keywords

Navigation