Deep Learning-Driven Intrusion Detection System for Distributed Denial of Service Mitigation

Wala ben Rhouma, Haythem Hayouni

Abstract


DDoS attacks continue to pose a serious risk to digital infrastructures, as they can render online services inaccessible without altering system files or gaining direct control over the target. Traditional security mechanisms often fall short in identifying these attacks promptly due to their massive scale and the subtlety with which they blend into regular traffic. With the advancement of artificial intelligence, especially in the realm of deep learning, new solutions are emerging to enhance the detection and classification of such threats. In this work, we focus on strengthening Intrusion Detection Systems (IDS) by leveraging deep learning methods to improve accuracy and responsiveness in detecting DDoS attacks. Using the comprehensive CIC-DDoS-2019 dataset, we experimented with several deep learning architectures including Feedforward Neural Networks (MLP), Convolutional Neural Networks (CNN), and Recurrent models incorporating Long Short-Term Memory (LSTM). These models were evaluated for their ability to analyze complex traffic behaviors and identify malicious activity within diverse network environments. his study contributes to the ongoing research on intelligent cybersecurity solutions by proposing deep learning-based IDS frameworks that not only detect threats with higher accuracy but also adapt to dynamic attack patterns. Our findings suggest that such models can serve as a critical component in modern security infrastructures, offering scalable and resilient defense mechanisms against increasingly sophisticated cyberattacks like DDoS. Our empirical results demonstrate that the MLP model yielded the most reliable performance, achieving an outstanding classification precision of 99.62% across various traffic categories. This highlights its effectiveness in isolating harmful flows from legitimate ones, thereby reducing the risk of false alarms and improving detection reliability.

Keywords


DDoS attack; Intrusion Detection System; Machine Learning; Deep Learning; Convolutional Neural Networks

References


D. Torre, F. Mesadieu, and A. Chennamaneni, ”Deep learning techniques to detect cybersecurity attacks: a systematic mapping study,” Empirical Software Engineering, vol. 28, no. 3, p. 76, 2023.

B. Habib and F. Khursheed, ”Time-based DDoS attack detection through hybrid LSTM-CNN model architectures: An investigation of many-to-one and many-to-many approaches,” Concurrency and Computation: Practice and Experience, vol. 36, no. 9, Feb. 2024.

Z. Xu, ”Deep Learning Based DDoS Attack Detection,” ITM Web of Conferences, vol. 70, 2025

K. Qian, B. Wang, and L. Li, “DDoS attack detection and mitigation based on attention-driven neural networks in cloud computing,” IEEE Access, vol. 11, pp. 30245–30259, 2023.

H. Liu et A. Patras, ”NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks,” Computer Communications, vol. 182, pp. 1–12, 2022.

Alfatemi, M. M. Islam, M. A. Hossain, and M. S. Kaiser, ”Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling,” IEEE Access, vol. 12, pp. 1–12, 2024.

S. Doriguzzi-Corin and G. Siracusa, ”FLAD: Adaptive Federated Learning for DDoS Attack Detection,” IEEE Transactions on Network and Service Management, vol. 19, no. 4, pp. 1–15, 2022.

D. Kumar, R. K. Pateriya, R. K. Gupta, V. Dehalwar, and A. Sharma, ”DDoS detection using deep learning,” Procedia Computer Science, vol. 218, pp. 2420–2429, 2023.

S. Shaikh, R. S. Raj, and R. S. Raj, ”Advancing DDoS Attack Detection with Hybrid Deep Learning: Integrating Convolutional Neural Networks, PCA, and Vision Transformers,” Future Generation Computer Systems, vol. 134, pp. 1–12, 2024.

F. Alanazi, K. Jambi, F. Eassa, M. Khemakhem, A. Basuhail, and K. Alsubhi, ”Ensemble deep learning models for mitigating DDoS attack in software-defined network,” Intelligent Automation Soft Computing, vol. 33, no. 2, 2022.

K. Kumari and M. Mrunalini, ”Detecting denial of service attacks using machine learning algorithms,” Journal of Big Data, vol. 9, no. 1, p. 56, 2022.

K. A. Dhanya, S. Vajipayajula, K. Srinivasan, A. Tibrewal, T. S. Kumar, and T. G. Kumar, ”Detection of network attacks using machine learning and deep learning models,” Procedia Computer Science, vol. 218, pp. 57–66, 2023.

S. Alshra’a, A. Farhat, and J. Seitz, ”Deep learning algorithms for detecting denial of service attacks in software-defined networks,” Procedia Computer Science, vol. 191, pp. 254–263, 2021.

Salmi and M. Oughdir, ”Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor networks,” Journal of Network and Computer Applications, vol. 204, p. 103347, 2023.

A. K. Gankotiya, V. Kumar, and K. S. Vaisla, ”Cross-layer DDoS attack detection in wireless mesh networks using deep learning algorithm,” Journal of Electrical Engineering, Feb. 2025.

O. Tonkal, H. Polat, E. Bas¸aran, Z. C ¨ omert, and R. Kocao ¨ glu, ”Machine learning approach equipped with neighbourhood component ˘analysis for DDoS attack detection in software-defined networking,” Electronics, vol. 10, no. 10, p. 1227, 2021.

M. S. Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, ”Network anomaly detection using LSTM-based autoencoder,” in Proc. Q2SWinet 2020, Alicante, Spain, Nov. 16–20, 2020.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, ”Toward generating a new intrusion detection dataset and intrusion traffic characterization,” in Proc. 4th Int. Conf. Inf. Syst. Secur. Priv. (ICISSP), Funchal, Madeira, Portugal, Jan. 2018, pp. 108–116.

M. C. P. Saheb, M. S. Yadav, S. Babu, J. J. Pujari, and J. B. Maddala, ”A review of DDoS evaluation dataset: CICDDoS2019 dataset,” in Proc. Int. Conf. Energy Syst., Drives and Automations, Singapore: Springer Nature Singapore, Dec. 2021, pp. 389–397.

M. Mittal, K. Kumar, and S. Behal, ”Deep learning approaches for detecting DDoS attacks: a systematic review,” Soft Computing, vol. 27, pp. 13039–13075, 2023


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats