International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF
Volume 74 | Issue 3 | Year 2026 | Article Id. IJETT-V74I3P127 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I3P127

VCROA-DNFN: A Big Data Approach in MapReduce Framework for DDoS Attack Detection using Optimized Deep Neuro Fuzzy Network


Rahul Vijay Kotawadekar, Suhasini Vijaykumar, Priya Chandran

Received Revised Accepted Published
22 Dec 2025 24 Jan 2026 06 Feb 2026 28 Mar 2026

Citation :

Rahul Vijay Kotawadekar, Suhasini Vijaykumar, Priya Chandran, "VCROA-DNFN: A Big Data Approach in MapReduce Framework for DDoS Attack Detection using Optimized Deep Neuro Fuzzy Network," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 3, pp. 388-407, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I3P127

Abstract

DDoS attacks have emerged as a major menace to network security, which is extremely challenging to privacy and service provision. Although different methodologies have been established to detect attacks and prevent their outcome, the methodologies remain ineffective in offering effective identification accuracy because of the high rate of false alarms. This paper will overcome these shortcomings by introducing an optimized version of deep learning methodology called Velocity Contour-based Remora Optimization Algorithm (VCROA)-Deep Neuro Fuzzy network (DNFN), which can be used to identify DDoS attacks in a MapReduce big data system. The VCROA algorithm incorporates the velocity contour mechanism in the Remora Optimization Algorithm (ROA) to choose the best features and optimize the weights of the network to increase the learning ability of the DNFN classifier. The experimental findings show that the proposed VCROA-DNFN to detect DDoS attacks has achieved an optimal accuracy, recall, and F-measure of 91.10, 93.70, and 91.70. The large values of precision, recall, and F-measure indicate that the proposed model is strong and consistent in the detection of DDoS attacks.

Keywords

Deep Neuro Fuzzy Network (DNFN), MapReduce, Velocity Contour-based Remora Optimization Algorithm (VC-ROA), Intrusion Detection System (IDS), Distributed Denial of Service (DDoS).

References

[1] Ankit Agarwal, Manju Khari, and Rajiv Singh, “Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application,” Wireless Personal Communications, vol. 127, no. 1, pp. 419-439, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[2] Rana Abu Bakar et al., “FTG-Net-E: A Hierarchical Ensemble Graph Neural Network for DDoS Attack Detection,” Computer Networks, vol. 250, pp. 1-13, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[3] Matheus P. Novaes et al., “Adversarial Deep Learning Approach Detection and Defense Against DDoS Attacks in SDN Environments,” Future Generation Computer Systems, vol. 125, pp. 156-167, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[4] Abdullah Emir Cil, Kazim Yildiz, and  Ali Buldu, “Detection of DDoS Attacks with Feed Forward based Deep Neural Network Model,” Expert Systems with Applications, vol. 169, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[5] Haizhen Wang, Xiaojing Yang, and Na Jia, “DDoS Attack Detection Method based on Improved Convolutional Long Short-Term Memory and Three-Way Decision in SDN,” PLOS One, vol. 20, no. 5, pp. 1-19, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

[6] R. Doriguzzi-Corin et al., “LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 876-889, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[7] Asmaa A. Elsaeidy, Abbas Jamalipour, and Kumudu S. Munasinghe, “A Hybrid Deep Learning Approach for Replay and DDoS Attack Detection in a Smart City,” IEEE Access, vol. 9, pp. 154864-154875, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[8]  M. Premkumar, and T.V.P. Sundararajan, “DLDM: Deep Learning-based Defense Mechanism for Denial of Service Attacks in Wireless Sensor Networks,” Microprocessors and Microsystems, vol. 79, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[9] Nour Moustafa, “BoT-IoT dataset,”  IEEE Daataport, 2026. [CrossRef] [Publisher Link]

[10] Heming Jia, Xiaoxu Peng, and Chunbo Lang, “Remora Optimization Algorithm,” Expert Systems with Applications, vol. 185, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[11] Md. Zahid Hasan, K.M. Zubair Hasan, and Abdus Sattar, “Burst Header Packet Flood Detection in Optical Burst Switching Network using Deep Learning Model,” Procedia Computer Science, vol. 143, pp. 970-977, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[12] Prabhakar Krishnan, Subhasri Duttagupta, and Krishnashree Achuthan, “VARMAN: Multi-Plane Security Framework for Software Defined Networks,” Computer Communications, vol. 148, pp. 215-239, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[13] Sakeena Javaid et al., “Towards Buildings Energy Management: Using Seasonal Schedules under Time of Use Pricing Tariff via Deep Neuro-Fuzzy Optimizer,” 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, pp. 1594-1599, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[14]  Mrutyunjaya Panda, and Manas Ranjan Patra, “Network Intrusion Detection using Naive Bayes,” International Journal of Computer Science and Network Security, vol. 7, no. 12, pp. 258-263, 2007.
[
Google Scholar] [Publisher Link]

[15] P. Vijaya Mehna Sangtani et al., “Implementation Challenges involved in Big Data Analytics,” International Journal of Engineering Sciences and Research Technology, vol. 5, no. 10, pp. 834-840, 2016. 
[
CrossRef] [Google Scholar] [Publisher Link]

[16] Mohan V. Pawar, and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia Computer Science, vol. 48, pp. 503-506, 2015.
[
CrossRef] [Google Scholar] [Publisher Link]

[17] Ahmad Javaid et al., “A Deep Learning Approach for Network Intrusion Detection System,” Proceedings of the 9th EAI International Conference on Bio-Inspired Information and Communications Technologies (Formerly BIONETICS), vol. 3, no. 9, pp. 21-26, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[18] Kaiyuan Jiang et al., “Network Intrusion Detection Combined Hybrid Sampling with Deep Hierarchical Network,” IEEE Access, vol. 8, pp. 32464-32476, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[19] T. Aditya Sai Srinivas, and S.S. Manivannan, “Prevention of Hello Flood Attack in IoT using Combination of Deep Learning with Improved Rider Optimization Algorithm,” Computer Communications, vol. 163, pp. 162-175, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[20] Rojalina Priyadarshini, and Rabindra Kumar Barik, “A Deep Learning based Intelligent Framework to Mitigate DDOS Attack in Fog Environment,” Journal of King Saud University Computer and Information Sciences, vol. 34, no. 3, pp. 825-831, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[21] Omolbanin Yazdanbakhsh, and Scott Dick, “A Deep Neuro-Fuzzy Network for Image Classification,” arXiv preprint, pp. 1-10, 2019. 
[
CrossRef] [Google Scholar] [Publisher Link]

[22] Junnan Yao et al., “Pre‐Processing of Incomplete Spectrum Sensing Data in Spectrum Sensing Data Falsification Attacks Detection: A Missing Data Imputation Approach,” IET Communications, vol. 10, no. 11, pp. 1340-1347, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[23] Vishal Maheshwari, Ashutosh Bhatia, and Kuldeep Kumar, “Faster Detection and Prediction of DDoS Attacks using MapReduce and Time Series Analysis,” 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, pp. 556-561, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[24] S. Shadravan, Hamid Reza Naji, and V.K. Bardsiri, “The Sailfish Optimizer: A Novel Nature-Inspired Metaheuristic Algorithm for Solving Constrained Engineering Optimization Problems,” Engineering Applications of Artificial Intelligence, vol. 80, pp. 20-34, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[25] Seyedali Mirjalili, and Andrew Lewis, “The Whale Optimization Algorithm,” Advances in Engineering Software, vol. 95, pp. 51-67, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[26] Iraj Naruei, and Farshid Keynia, “A New Optimization Method based on COOT Bird Natural Life Model,” Expert Systems with Applications, vol. 183, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[27] Boddupally Janaiah, “Attack Detection in IoT using DBN based Optimization Algorithm,” Journal of Networking and Communication Systems, vol. 5, no. 1, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[28] A.V. Krishna Prasad, “Deep Learning based Optimization for Detection of Attacks in IoT,” Journal of Networking and Communication Systems, vol. 4, no. 2, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[29] The UNSW-NB15 Dataset, 2025. [Online]. Available: https://research.unsw.edu.au/projects/unsw-nb15-dataset  

[30] Abdulrahman A. Alshdadi et al., “Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection,” Future Internet, vol. 16, no. 12, pp. 1-26, 2024. 
[
CrossRef] [Google Scholar] [Publisher Link]

[31] Ahmed Jamal Ibrahim, Sándor R. Répás, and Nurullah Bektaş, “Feature-Optimized Machine Learning Approaches for Enhanced DDoS Attack Detection and Mitigation,” Computers, vol. 14, no.11, pp. 1-33, 2025.

[CrossRef] [Google Scholar] [Publisher Link]

[32] Christopher A. Ramezan, “Transferability of Recursive Feature Elimination (RFE)-Derived Feature Sets for Support Vector Machine Land Cover Classification,” Remote Sensing, vol. 14, no. 24, pp. 1-25, 2022.
[
CrossRef] [Google Scholar] [Publisher Link

[33] Yimeng Guo et al., “Development and Validation of a Survival Prediction Model for Patients with Advanced Non-Small Cell Lung Cancer based on LASSO Regression,” Frontiers in Immunology, vol. 15, pp. 1-17, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[34] Chintalpudi S.L. Prasanna, Md Zia Ur Rahman, and Masreshaw D. Bayleyegn, “Brain Epileptic Seizure Detection using Joint CNN and Exhaustive Feature Selection with RNN-BLSTM Classifier,” IEEE Access, vol. 1, pp. 97990 - 98004, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]