Research Article | Open Access | Download PDF
Volume 74 | Issue 3 | Year 2026 | Article Id. IJETT-V74I3P127 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I3P127VCROA-DNFN: A Big Data Approach in MapReduce Framework for DDoS Attack Detection using Optimized Deep Neuro Fuzzy Network
Rahul Vijay Kotawadekar, Suhasini Vijaykumar, Priya Chandran
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 22 Dec 2025 | 24 Jan 2026 | 06 Feb 2026 | 28 Mar 2026 |
Citation :
Rahul Vijay Kotawadekar, Suhasini Vijaykumar, Priya Chandran, "VCROA-DNFN: A Big Data Approach in MapReduce Framework for DDoS Attack Detection using Optimized Deep Neuro Fuzzy Network," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 3, pp. 388-407, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I3P127
Abstract
DDoS attacks have emerged as a major menace to network security, which is extremely challenging to privacy and service provision. Although different methodologies have been established to detect attacks and prevent their outcome, the methodologies remain ineffective in offering effective identification accuracy because of the high rate of false alarms. This paper will overcome these shortcomings by introducing an optimized version of deep learning methodology called Velocity Contour-based Remora Optimization Algorithm (VCROA)-Deep Neuro Fuzzy network (DNFN), which can be used to identify DDoS attacks in a MapReduce big data system. The VCROA algorithm incorporates the velocity contour mechanism in the Remora Optimization Algorithm (ROA) to choose the best features and optimize the weights of the network to increase the learning ability of the DNFN classifier. The experimental findings show that the proposed VCROA-DNFN to detect DDoS attacks has achieved an optimal accuracy, recall, and F-measure of 91.10, 93.70, and 91.70. The large values of precision, recall, and F-measure indicate that the proposed model is strong and consistent in the detection of DDoS attacks.
Keywords
Deep Neuro Fuzzy Network (DNFN), MapReduce, Velocity Contour-based Remora Optimization Algorithm (VC-ROA), Intrusion Detection System (IDS), Distributed Denial of Service (DDoS).
References
[1] Ankit Agarwal, Manju
Khari, and Rajiv Singh, “Detection of DDOS Attack using Deep Learning Model in
Cloud Storage Application,” Wireless
Personal Communications, vol. 127, no. 1, pp. 419-439, 2021.
[CrossRef] [Google Scholar]
[Publisher Link]
[2] Rana Abu Bakar et al.,
“FTG-Net-E: A Hierarchical Ensemble Graph Neural Network for DDoS Attack
Detection,” Computer Networks, vol.
250, pp. 1-13, 2024.
[CrossRef] [Google Scholar]
[Publisher Link]
[3] Matheus P. Novaes et
al., “Adversarial Deep Learning Approach Detection and Defense Against DDoS
Attacks in SDN Environments,” Future
Generation Computer Systems, vol. 125, pp. 156-167, 2021.
[CrossRef] [Google Scholar]
[Publisher Link]
[4] Abdullah Emir Cil,
Kazim Yildiz, and Ali Buldu, “Detection
of DDoS Attacks with Feed Forward based Deep Neural Network Model,” Expert Systems with Applications, vol.
169, 2021.
[CrossRef] [Google Scholar]
[Publisher Link]
[5] Haizhen Wang, Xiaojing
Yang, and Na Jia, “DDoS Attack Detection Method based on Improved Convolutional
Long Short-Term Memory and Three-Way Decision in SDN,” PLOS One, vol. 20, no. 5, pp. 1-19, 2025.
[CrossRef] [Google Scholar]
[Publisher Link]
[6] R. Doriguzzi-Corin et
al., “LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack
Detection,” IEEE Transactions on Network
and Service Management, vol. 17, no. 2, pp. 876-889, 2020.
[CrossRef] [Google Scholar]
[Publisher Link]
[7] Asmaa A. Elsaeidy,
Abbas Jamalipour, and Kumudu S. Munasinghe, “A Hybrid Deep Learning Approach
for Replay and DDoS Attack Detection in a Smart City,” IEEE Access, vol. 9, pp. 154864-154875, 2021.
[CrossRef] [Google Scholar]
[Publisher Link]
[8] M. Premkumar, and
T.V.P. Sundararajan, “DLDM: Deep Learning-based Defense Mechanism for Denial of
Service Attacks in Wireless Sensor Networks,” Microprocessors and Microsystems, vol. 79, 2020.
[CrossRef] [Google Scholar]
[Publisher Link]
[9] Nour Moustafa, “BoT-IoT dataset,” IEEE Daataport, 2026. [CrossRef] [Publisher Link]
[10] Heming Jia, Xiaoxu
Peng, and Chunbo Lang, “Remora Optimization Algorithm,” Expert Systems with Applications, vol. 185, 2021.
[CrossRef] [Google Scholar]
[Publisher Link]
[11] Md. Zahid Hasan, K.M.
Zubair Hasan, and Abdus Sattar, “Burst Header Packet Flood Detection in Optical
Burst Switching Network using Deep Learning Model,” Procedia Computer Science, vol. 143, pp. 970-977, 2018.
[CrossRef] [Google Scholar]
[Publisher Link]
[12] Prabhakar Krishnan,
Subhasri Duttagupta, and Krishnashree Achuthan, “VARMAN: Multi-Plane Security
Framework for Software Defined Networks,” Computer
Communications, vol. 148, pp. 215-239, 2019.
[CrossRef] [Google Scholar]
[Publisher Link]
[13] Sakeena Javaid et al.,
“Towards Buildings Energy Management: Using Seasonal Schedules under Time of
Use Pricing Tariff via Deep Neuro-Fuzzy Optimizer,” 2019 15th International Wireless Communications & Mobile
Computing Conference (IWCMC), Tangier, Morocco, pp. 1594-1599, 2019.
[CrossRef] [Google Scholar]
[Publisher Link]
[14]
Mrutyunjaya Panda, and
Manas Ranjan Patra, “Network Intrusion Detection using Naive Bayes,” International Journal of Computer Science
and Network Security, vol. 7, no. 12, pp. 258-263, 2007.
[Google Scholar]
[Publisher Link]
[15] P. Vijaya Mehna
Sangtani et al., “Implementation Challenges involved in Big Data Analytics,” International Journal of Engineering
Sciences and Research Technology, vol. 5, no. 10, pp. 834-840, 2016.
[CrossRef] [Google Scholar]
[Publisher Link]
[16] Mohan V. Pawar, and J.
Anuradha, “Network Security and Types of Attacks in Network,” Procedia Computer Science, vol. 48, pp.
503-506, 2015.
[CrossRef] [Google Scholar]
[Publisher Link]
[17] Ahmad Javaid et al., “A
Deep Learning Approach for Network Intrusion Detection System,” Proceedings of the 9th EAI
International Conference on Bio-Inspired Information and Communications
Technologies (Formerly BIONETICS), vol. 3, no. 9, pp. 21-26, 2016.
[CrossRef] [Google Scholar]
[Publisher Link]
[18] Kaiyuan Jiang et al.,
“Network Intrusion Detection Combined Hybrid Sampling with Deep Hierarchical
Network,” IEEE Access, vol. 8, pp.
32464-32476, 2020.
[CrossRef] [Google Scholar]
[Publisher Link]
[19] T. Aditya Sai Srinivas,
and S.S. Manivannan, “Prevention of Hello Flood Attack in IoT using Combination
of Deep Learning with Improved Rider Optimization Algorithm,” Computer Communications, vol. 163, pp.
162-175, 2020.
[CrossRef] [Google Scholar]
[Publisher Link]
[20] Rojalina Priyadarshini,
and Rabindra Kumar Barik, “A Deep Learning based Intelligent Framework to
Mitigate DDOS Attack in Fog Environment,” Journal
of King Saud University Computer and Information Sciences, vol. 34, no. 3,
pp. 825-831, 2022.
[CrossRef] [Google Scholar]
[Publisher Link]
[21] Omolbanin Yazdanbakhsh,
and Scott Dick, “A Deep Neuro-Fuzzy Network for Image Classification,” arXiv preprint, pp. 1-10, 2019.
[CrossRef] [Google Scholar]
[Publisher Link]
[22] Junnan Yao et al.,
“Pre‐Processing of Incomplete Spectrum Sensing Data in Spectrum Sensing Data
Falsification Attacks Detection: A Missing Data Imputation Approach,” IET Communications, vol. 10, no. 11, pp.
1340-1347, 2016.
[CrossRef] [Google Scholar]
[Publisher Link]
[23] Vishal Maheshwari,
Ashutosh Bhatia, and Kuldeep Kumar, “Faster Detection and Prediction of DDoS
Attacks using MapReduce and Time Series Analysis,” 2018 International Conference on Information Networking (ICOIN),
Chiang Mai, Thailand, pp. 556-561, 2018.
[CrossRef] [Google Scholar]
[Publisher Link]
[24] S. Shadravan, Hamid
Reza Naji, and V.K. Bardsiri, “The Sailfish Optimizer: A Novel Nature-Inspired
Metaheuristic Algorithm for Solving Constrained Engineering Optimization
Problems,” Engineering Applications of
Artificial Intelligence, vol. 80, pp. 20-34, 2019.
[CrossRef] [Google Scholar]
[Publisher Link]
[25] Seyedali Mirjalili, and
Andrew Lewis, “The Whale Optimization Algorithm,” Advances in Engineering Software, vol. 95, pp. 51-67, 2016.
[CrossRef] [Google Scholar]
[Publisher Link]
[26] Iraj Naruei, and
Farshid Keynia, “A New Optimization Method based on COOT Bird Natural Life
Model,” Expert Systems with Applications,
vol. 183, 2021.
[CrossRef] [Google Scholar]
[Publisher Link]
[27] Boddupally Janaiah, “Attack Detection in IoT using DBN based Optimization Algorithm,” Journal of Networking and Communication Systems, vol. 5, no. 1, 2022.
[CrossRef] [Google Scholar]
[Publisher Link]
[28] A.V. Krishna Prasad,
“Deep Learning based Optimization for Detection of Attacks in IoT,” Journal of Networking and Communication
Systems, vol. 4, no. 2, 2021.
[CrossRef] [Google Scholar]
[Publisher Link]
[29] The UNSW-NB15 Dataset,
2025. [Online]. Available: https://research.unsw.edu.au/projects/unsw-nb15-dataset
[30] Abdulrahman A. Alshdadi
et al., “Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection,” Future Internet, vol. 16, no. 12, pp.
1-26, 2024.
[CrossRef] [Google Scholar]
[Publisher Link]
[31] Ahmed Jamal Ibrahim, Sándor R. Répás, and Nurullah Bektaş, “Feature-Optimized Machine Learning Approaches for Enhanced DDoS Attack Detection and Mitigation,” Computers, vol. 14, no.11, pp. 1-33, 2025.
[CrossRef] [Google Scholar]
[Publisher Link]
[32] Christopher
A. Ramezan, “Transferability of Recursive Feature Elimination (RFE)-Derived
Feature Sets for Support Vector Machine Land Cover Classification,” Remote Sensing, vol. 14, no. 24, pp.
1-25, 2022.
[CrossRef] [Google Scholar]
[Publisher Link]
[33] Yimeng
Guo et al., “Development and Validation of a Survival Prediction Model for
Patients with Advanced Non-Small Cell Lung Cancer based on LASSO Regression,” Frontiers in Immunology, vol. 15, pp.
1-17, 2024.
[CrossRef] [Google Scholar]
[Publisher Link]
[34] Chintalpudi S.L.
Prasanna, Md Zia Ur Rahman, and Masreshaw D. Bayleyegn, “Brain Epileptic
Seizure Detection using Joint CNN and Exhaustive Feature Selection with
RNN-BLSTM Classifier,” IEEE Access,
vol. 1, pp. 97990 - 98004, 2023.
[CrossRef] [Google Scholar]
[Publisher Link]