Deep Learning-Driven Intrusion Detection System for Distributed Denial of Service Mitigation
Abstract
Keywords
References
D. Torre, F. Mesadieu, and A. Chennamaneni, ”Deep learning techniques to detect cybersecurity attacks: a systematic mapping study,” Empirical Software Engineering, vol. 28, no. 3, p. 76, 2023.
B. Habib and F. Khursheed, ”Time-based DDoS attack detection through hybrid LSTM-CNN model architectures: An investigation of many-to-one and many-to-many approaches,” Concurrency and Computation: Practice and Experience, vol. 36, no. 9, Feb. 2024.
Z. Xu, ”Deep Learning Based DDoS Attack Detection,” ITM Web of Conferences, vol. 70, 2025
K. Qian, B. Wang, and L. Li, “DDoS attack detection and mitigation based on attention-driven neural networks in cloud computing,” IEEE Access, vol. 11, pp. 30245–30259, 2023.
H. Liu et A. Patras, ”NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks,” Computer Communications, vol. 182, pp. 1–12, 2022.
Alfatemi, M. M. Islam, M. A. Hossain, and M. S. Kaiser, ”Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling,” IEEE Access, vol. 12, pp. 1–12, 2024.
S. Doriguzzi-Corin and G. Siracusa, ”FLAD: Adaptive Federated Learning for DDoS Attack Detection,” IEEE Transactions on Network and Service Management, vol. 19, no. 4, pp. 1–15, 2022.
D. Kumar, R. K. Pateriya, R. K. Gupta, V. Dehalwar, and A. Sharma, ”DDoS detection using deep learning,” Procedia Computer Science, vol. 218, pp. 2420–2429, 2023.
S. Shaikh, R. S. Raj, and R. S. Raj, ”Advancing DDoS Attack Detection with Hybrid Deep Learning: Integrating Convolutional Neural Networks, PCA, and Vision Transformers,” Future Generation Computer Systems, vol. 134, pp. 1–12, 2024.
F. Alanazi, K. Jambi, F. Eassa, M. Khemakhem, A. Basuhail, and K. Alsubhi, ”Ensemble deep learning models for mitigating DDoS attack in software-defined network,” Intelligent Automation Soft Computing, vol. 33, no. 2, 2022.
K. Kumari and M. Mrunalini, ”Detecting denial of service attacks using machine learning algorithms,” Journal of Big Data, vol. 9, no. 1, p. 56, 2022.
K. A. Dhanya, S. Vajipayajula, K. Srinivasan, A. Tibrewal, T. S. Kumar, and T. G. Kumar, ”Detection of network attacks using machine learning and deep learning models,” Procedia Computer Science, vol. 218, pp. 57–66, 2023.
S. Alshra’a, A. Farhat, and J. Seitz, ”Deep learning algorithms for detecting denial of service attacks in software-defined networks,” Procedia Computer Science, vol. 191, pp. 254–263, 2021.
Salmi and M. Oughdir, ”Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor networks,” Journal of Network and Computer Applications, vol. 204, p. 103347, 2023.
A. K. Gankotiya, V. Kumar, and K. S. Vaisla, ”Cross-layer DDoS attack detection in wireless mesh networks using deep learning algorithm,” Journal of Electrical Engineering, Feb. 2025.
O. Tonkal, H. Polat, E. Bas¸aran, Z. C ¨ omert, and R. Kocao ¨ glu, ”Machine learning approach equipped with neighbourhood component ˘analysis for DDoS attack detection in software-defined networking,” Electronics, vol. 10, no. 10, p. 1227, 2021.
M. S. Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, ”Network anomaly detection using LSTM-based autoencoder,” in Proc. Q2SWinet 2020, Alicante, Spain, Nov. 16–20, 2020.
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, ”Toward generating a new intrusion detection dataset and intrusion traffic characterization,” in Proc. 4th Int. Conf. Inf. Syst. Secur. Priv. (ICISSP), Funchal, Madeira, Portugal, Jan. 2018, pp. 108–116.
M. C. P. Saheb, M. S. Yadav, S. Babu, J. J. Pujari, and J. B. Maddala, ”A review of DDoS evaluation dataset: CICDDoS2019 dataset,” in Proc. Int. Conf. Energy Syst., Drives and Automations, Singapore: Springer Nature Singapore, Dec. 2021, pp. 389–397.
M. Mittal, K. Kumar, and S. Behal, ”Deep learning approaches for detecting DDoS attacks: a systematic review,” Soft Computing, vol. 27, pp. 13039–13075, 2023
Refbacks
- There are currently no refbacks.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272
This work is licensed under a Creative Commons Attribution 4.0 International License.