www.matlabsimulation.com

Analysis of DDoS Attack Detection Mitigation in a Smart City

 

Related Pages

Research Areas

Related Tools

Performance Analysis of DDoS Attack Detection and Mitigation in a Smart City Environment

Implementation Plan:
************************

Step 1: Initially, we collect and load data from DDoS attack detection dataset

Step 2: Then, we preprocess the collected data using Local Outlier Factor (LOF) and Equal Time Step Sliding Window method.

Step 3: Next, we perform a feature extraction process using Deep Autoencoders with Gradient Boosting Machines (GBM) technique.

Step 4: Then, we train the data using Cyclical Learning Rates (CLR) with Adam Optimization Algorithm to improve speed and accuracy.

Step 5: Next, we filter the unwanted harmful updates using SecureMeta-RFA Aggregation and Backdoor detection with Feedback-based FL (BAFFLE)

Step 6: Next, we detect DDoS attacks using the Federated LSTM networks with Random Forest classifiers (FedLSTM-RF) OptimizerNet algorithm.

Step 7: Then, we mitigate the DDOS attack using the Sparse DRL-Enhanced Extreme Learning Machine (SD-ELM) algorithm.

Step 8: Finally, we plot performance metrics for the following:

8.1: Number of Epochs Vs. Accuracy (%)
8.2:Number of Epochs Vs. Precision (%)
8.3: Number of Epochs Vs. Recall (%)
8.4:Number of Epochs Vs. F1-Score (%)
8.5: Number of Epochs Vs. Response time
8.6:Number of Epochs Vs. Learning rate

Software Requirements:
***************************
1. Development Tool: Python 3.11.9
2. Operating System: Windows-10 (64-bit) or above

Dataset:
*********

Link : https://www.kaggle.com/datasets/himadri07/ciciot2023

Note:
******

1) If the proposed plan does not fully align with your requirements, please provide all necessary details—including steps, parameters, models, and expected outcomes—in advance. Kindly ensure that any missing configurations or specifications are clearly outlined in the plan before confirming.

2) If there’s no built-in solution for what the project needs, we can always turn to reference models, customize our own, different math models or write the code ourselves to fulfil the process.

3) If the plan satisfies your requirement, Please confirm with us.

4) Project based on Simulation only.

We perform with an Existing Approach Ref 1- Title: Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Existing approach CICIDS2017 dataset link: https://www.kaggle.com/datasets/chethuhn/network-intrusion-dataset

A life is full of expensive thing ‘TRUST’ Our Promises

Great Memories Our Achievements

We received great winning awards for our research awesomeness and it is the mark of our success stories. It shows our key strength and improvements in all research directions.

Our Guidance

  • Assignments
  • Homework
  • Projects
  • Literature Survey
  • Algorithm
  • Pseudocode
  • Mathematical Proofs
  • Research Proposal
  • System Development
  • Paper Writing
  • Conference Paper
  • Thesis Writing
  • Dissertation Writing
  • Hardware Integration
  • Paper Publication
  • MS Thesis

24/7 Support, Call Us @ Any Time matlabguide@gmail.com +91 94448 56435