Paper
20 June 2023 Attention-fused recurrent neural networks for DDoS attack detection based on blockchain technology
Zixin Shi
Author Affiliations +
Proceedings Volume 12715, Eighth International Conference on Electronic Technology and Information Science (ICETIS 2023); 127151X (2023) https://doi.org/10.1117/12.2682327
Event: Eighth International Conference on Electronic Technology and Information Science (ICETIS 2023), 2023, Dalian, China
Abstract
With the advent of the "Internet +" era, network viruses, hacker attacks, and personal data breaches have gradually become the cybersecurity issues that people are concerned about. Blockchain technology has the advantages such as decentralization, immutability, and smart contracts. It can be used in network infrastructure protection to prevent computers from being hacked illegally, ensuring the integrity and security of users' personal data. In this paper, we propose a DDoS attack detection method based on the attention mechanism of LSTM that involves using a deep learning model to analyze network traffic data and identify DDoS attacks, named A-LSTM. The attention mechanism in LSTM helps to focus on the most important features in the data, which are critical for accurate DDoS attack detection. This method has the potential to improve the accuracy of DDoS attack detection compared to traditional methods by leveraging the powerful pattern recognition capabilities of deep learning models.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zixin Shi "Attention-fused recurrent neural networks for DDoS attack detection based on blockchain technology", Proc. SPIE 12715, Eighth International Conference on Electronic Technology and Information Science (ICETIS 2023), 127151X (20 June 2023); https://doi.org/10.1117/12.2682327
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Blockchain

Computer security

Computing systems

Data modeling

Internet

Viruses

Back to Top