TY - JOUR
T1 - Adaptive DDoS detection mode in software-defined SIP-VoIP using transfer learning with boosted meta-learner
AU - Yoro, Rume Elizabeth
AU - Okpor, Margaret Dumebi
AU - Akazue, Maureen Ifeanyi
AU - Okpako, Ejaita Abugor
AU - Eboka, Andrew Okonji
AU - Ejeh, Patrick Ogholuwarami
AU - Ojugo, Arnold Adimabua
AU - Odiakaose, Chris Chukwufunaya
AU - Binitie, Amaka Patience
AU - Ako, Rita Erhovwo
AU - Geteloma, Victor Ochuko
AU - Onoma, Paul Avwerosuo
AU - Max-Egba, Asuobite ThankGod
AU - Ibor, Ayei Egu
AU - Onyemenem, Sunny Innocent
AU - Ukwandu, Elochukwu
N1 - Publisher Copyright:
© 2025 Yoro et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
PY - 2025/6/26
Y1 - 2025/6/26
N2 - The Internet has continued to provision its infrastructure as a platform for competitive marketing, enhanced productivity, and monetization efficacy. However, it has become a means for adversaries to exploit unsuspecting users and, in turn, compromise network resources. The utilization of filters, gateways, firewalls, and intrusion detection systems has only minimized the effects of adversaries. Thus, with the constant evolution of exploitation and penetrative techniques in network security, security experts are required to also evolve their mitigation and defensive measures by using advanced tools such as machine learning approach(es) poised to help detect and stop as close to its source, any attack or threat. This will help to quickly identify malicious packets and prevent resource exploits and service disruption. To curb these, studies have sought to minimize the effects of these attacks via advanced machine learning (ML) inspired tools. Traditional ML performance is often degraded due to: (a) its simplistic design that is unsuitable to handle categorical datasets effectively, and (b) its adoption of hill-climbing mode that yields solution(s) that are stuck at local maxima. To avoid such pitfalls, we use deep learning (DL) schemes based on recurrent networks. They present the demerits of the vanishing gradient problem and require longer training time. To curb the challenges of ML and DL, we propose a transfer learning scheme with 3-base (BiGRU, BiLSTM, and Random Forest) classifiers and XGBoost meta-learner to aid effective identification of DDoS. The ensemble yields Accuracy and F1 of 1.000 to effectively classify 314,102-DDoS-cases during its evaluation. The proposed ensemble demonstrates that it can efficiently identify malicious packets for DDoS attacks in network transactions.
AB - The Internet has continued to provision its infrastructure as a platform for competitive marketing, enhanced productivity, and monetization efficacy. However, it has become a means for adversaries to exploit unsuspecting users and, in turn, compromise network resources. The utilization of filters, gateways, firewalls, and intrusion detection systems has only minimized the effects of adversaries. Thus, with the constant evolution of exploitation and penetrative techniques in network security, security experts are required to also evolve their mitigation and defensive measures by using advanced tools such as machine learning approach(es) poised to help detect and stop as close to its source, any attack or threat. This will help to quickly identify malicious packets and prevent resource exploits and service disruption. To curb these, studies have sought to minimize the effects of these attacks via advanced machine learning (ML) inspired tools. Traditional ML performance is often degraded due to: (a) its simplistic design that is unsuitable to handle categorical datasets effectively, and (b) its adoption of hill-climbing mode that yields solution(s) that are stuck at local maxima. To avoid such pitfalls, we use deep learning (DL) schemes based on recurrent networks. They present the demerits of the vanishing gradient problem and require longer training time. To curb the challenges of ML and DL, we propose a transfer learning scheme with 3-base (BiGRU, BiLSTM, and Random Forest) classifiers and XGBoost meta-learner to aid effective identification of DDoS. The ensemble yields Accuracy and F1 of 1.000 to effectively classify 314,102-DDoS-cases during its evaluation. The proposed ensemble demonstrates that it can efficiently identify malicious packets for DDoS attacks in network transactions.
KW - Algorithms
KW - Computer Security
KW - Humans
KW - Internet
KW - Machine Learning
KW - Software
UR - http://www.scopus.com/inward/record.url?scp=105009135124&partnerID=8YFLogxK
U2 - 10.1371/journal.pone.0326571
DO - 10.1371/journal.pone.0326571
M3 - Article
C2 - 40569976
SN - 1932-6203
VL - 20
JO - PLoS ONE
JF - PLoS ONE
IS - 6
M1 - e0326571
ER -