{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T19:02:29Z","timestamp":1769713349673,"version":"3.49.0"},"reference-count":19,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,7,2]]},"abstract":"<jats:p>The research aims to provide network security so that it can be protected from several attacks, especially DoS (Denial-of-Service) or DDoS (Distributed Denial-of-Service) attacks that could at some point render the server inoperable. Security is one of the main obstacles. There are a lot of network risks and attacks available today. One of the most common and disruptive attacks is a DDoS attack. In this study, upgraded deep learning Elephant Herd Optimization with random forest classifier is employed for early DDos attack detection. The DDoS dataset\u2019s number of characteristics is decreased by the proposed IDN-EHO method for classifying data learning that works with a lot of data. In the feature extraction stage, deep neural networks (DNN) approach is used, and the classified data packages are compared to return the DDoS attack traffic characteristics with a significant percentage. In the classification stage, the proposed deep learning Elephant Herd Optimization with random forest classifier used to classify the data learning which deal with a huge amount of data and minimise the number of features of the DDoS dataset. During the detection step, when the extracted features are used as input features, the attack detection model is trained using the improved deep learning Elephant Herd Optimization. The proposed framework has the potential to be a promising method for identifying unidentified DDoS attacks, according to experiments. 99% recall, precision, and accuracy can be attained using the suggested strategy, according on the findings of the experiments.<\/jats:p>","DOI":"10.3233\/jifs-224149","type":"journal-article","created":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T12:17:19Z","timestamp":1678450639000},"page":"1805-1816","source":"Crossref","is-referenced-by-count":0,"title":["Novel deep learning approach for DDoS attack using elephant heard optimization algorithm along with a fuzzy classifier for rules learning"],"prefix":"10.1177","volume":"45","author":[{"given":"J.","family":"Caroline Misbha","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Arunachala College of Engineering for Women, Nagercoil, Tamil Nadu, India"}]},{"given":"T.","family":"Ajith Bosco Raj","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, PSN College of Engineering and Technology, Melathediyoor, Tirunelveli, Tamil Nadu, India"}]},{"given":"G.","family":"Jiji","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Lord Jegannath College of Engineering and Technology, Nagercoil, Tamil Nadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-224149_ref1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.3390\/jsan11030032","article-title":"Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things","volume":"11","author":"Kuburat Oyeranti Adefemi Alimi","year":"2022","journal-title":"J Sens Actuator Netw"},{"issue":"4","key":"10.3233\/JIFS-224149_ref2","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.3390\/s22041340","article-title":"HDL-IDS: a hybrid deep learning architecture for intrusion detection in the Internet of Vehicles","volume":"22","author":"Ullah","year":"2022","journal-title":"Sensors"},{"key":"10.3233\/JIFS-224149_ref3","doi-asserted-by":"crossref","unstructured":"Jiyeon Kim , Jiwon Kim , Hyunjung Kim , Minsun Shim and Eunjung Choi , CNN-Based Network Intrusion Detection against Denial-of-Service Attacks, Electronics, 9(6) (2020), 916. https:\/\/doi.org\/10.3390\/electronics9060916","DOI":"10.3390\/electronics9060916"},{"issue":"9","key":"10.3233\/JIFS-224149_ref4","doi-asserted-by":"crossref","first-page":"3367","DOI":"10.3390\/s22093367","article-title":"Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models","volume":"22","author":"Almaraz-Rivera","year":"2022","journal-title":"Sensors"},{"issue":"14","key":"10.3233\/JIFS-224149_ref5","doi-asserted-by":"crossref","first-page":"8374","DOI":"10.3390\/su14148374","article-title":"Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models","volume":"14","author":"Islam","year":"2022","journal-title":"Sustainability"},{"issue":"7","key":"10.3233\/JIFS-224149_ref6","doi-asserted-by":"crossref","first-page":"2697","DOI":"10.3390\/s22072697","article-title":"Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT","volume":"22","author":"Aslam","year":"2022","journal-title":"Sensors"},{"issue":"6","key":"10.3233\/JIFS-224149_ref7","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.3390\/sym14061095","article-title":"Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method","volume":"14","author":"Alduailij","year":"2022","journal-title":"Symmetry"},{"key":"10.3233\/JIFS-224149_ref8","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.3390\/electronics10151854","article-title":"A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition","volume":"10","author":"Jevgenijus Toldinas","year":"2021","journal-title":"Electronics"},{"key":"10.3233\/JIFS-224149_ref9","doi-asserted-by":"crossref","first-page":"1257","DOI":"10.3390\/electronics10111257","article-title":"Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0","volume":"10","author":"Mohamed Amine Ferrag","year":"2021","journal-title":"Electronics"},{"issue":"11","key":"10.3233\/JIFS-224149_ref11","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.3390\/electronics10111227","article-title":"Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking","volume":"10","author":"Tonkal","year":"2021","journal-title":"Electronics"},{"key":"10.3233\/JIFS-224149_ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6173-7"},{"key":"10.3233\/JIFS-224149_ref13","doi-asserted-by":"publisher","DOI":"10.1109\/confluence51648.2021.9376879"},{"issue":"1","key":"10.3233\/JIFS-224149_ref14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.3390\/proceedings2020063051","article-title":"A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression","volume":"63","author":"Sambangi","year":"2020","journal-title":"Proceedings"},{"key":"10.3233\/JIFS-224149_ref15","doi-asserted-by":"publisher","DOI":"10.1109\/itnec48623.2020.9085007"},{"key":"10.3233\/JIFS-224149_ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03323-w"},{"key":"10.3233\/JIFS-224149_ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2020.2971776"},{"key":"10.3233\/JIFS-224149_ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2974520"},{"key":"10.3233\/JIFS-224149_ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icc40277.2020.9149043"},{"key":"10.3233\/JIFS-224149_ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00310-w"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-224149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T08:27:29Z","timestamp":1769675249000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-224149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,2]]},"references-count":19,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-224149","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,2]]}}}