Submitted:
17 April 2025
Posted:
19 April 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. DDoS Attacks
3. Related Work
| Reference | Datasets | Objective | Methodology | Limitations |
|---|---|---|---|---|
| (Jullian et al. 2023) | NSL KDD | To develop a robust and efficient deep learning-based distributed attack detection framework for IoT networks. | Feedforward neural networks and recurrent neural networks (RNNs) | Deploying and managing a distributed system across an extensive, diverse IoT network can be complex. |
| (Silivery et al. 2023) | NSL KDD | To develop a deep learning-based model for classifying multiple cyber-attacks, aiming to improve the accuracy and effectiveness of intrusion detection systems. | Long-Short-Term Memory Recurrent Neural Network (LSTM-RNN) |
Complex Model High False Alarm Rate |
| (Aktar and Yasin Nur 2023) | NSL KDD | To investigate the use of a deep learning approach for detecting DDoS attacks, potentially improving the accuracy and effectiveness of DDoS detection methods. | Deep Contractive Autoencoder (DCAE) |
The availability and quality of the training data may limit the model’s performance, potentially leading to inaccurate or biased detection results. |
| (Motylinski et al. 2022) | NSL KDD | To enhance the speed of detection while upholding a commendable level of accuracy. | SVM, logistic regression, KNN |
The use of GPU technology results in decreased training and prediction time. |
| (Ismail et al. 2022) | NSL KDD | To categorize and predict various types of DDoSattacks through the application of machine learning. | Random forest, XGBoost |
Improved accuracy may be achieved using an enhanced suggested model. |
| (Hariprasad 2022) | NSL KDD | To develop a precise and effective DDoS attack detection system for IoT networks with a hybrid Sample Selected RNN-ELM model. | Recurrent Neural Networks (RNNs) and Extreme Learning Machines (ELMs) | The model’s efficiency may hinge on the quality and variety of the training data and the particular attributes of the IoT network environment. |
| (Almadhor et al. 2024) | NSL KDD | To provide a resilient and privacy-conscious DDoS attack detection solution for diverse IoT contexts by integrating federated learning with explainable a50rtificial intelligence approaches. | Explainable Artificial Intelligence (XAI) with Federated Deep Neural Networks (FDNNs) | The efficiency of this methodology may be affected by issues including communication latency, variability in device capabilities, and the intricacy of incorporating XAI algorithms into the federated learning framework. |
| (Ahmad, Wan, and Ahmad 2023) | NSL KDD | To develop an optimized ensemble framework using big data analytics to effectively detect DDoS attacks targeting (IoT) | Convolutional Neural Network (CNN) embedded with a Gated Recurrent Unit (GRU) |
The model’s complexity results in high computational time |
| (Sanmorino, Marnisah, and Kesuma 2024) | NSL KDD | To develop a DDoS attack detection system using fine-tuned Multi-Layer Perceptrons. | fine-tuned Multi-Layer Perceptron models | They are computationally intensive and slow |
| (Revathi, Ramalingam, and Amutha 2021) | NSL KDD | To develop a system by integrating machine learning techniques with an SDN controller framework. | Support Vector Machines, Decision Trees | The system may need to be continuously updated and adapted to address new and evolving DDoS attack techniques effectively. |
4. Motivation
5. Dataset
6. Proposed Technique

- Phase 1: Data Preprocessing
- Phase 2: Feature Selection
- Phase 3: Data Modeling
- Phase 4: Classification
7. Data Preprocessing
8. Feature Selection


9. Models Selection
10. Classification

11. Results and Discussion
| System receives NSL-KDD dataset IF data == “RAW” then Preprocess data: - Encode categorical features - Normalize numeric features ENDIF Split data into TrainingSet and TestSet Use ExtraTreesClassifier on TrainingSet Select top important features Apply feature selection on both sets FOR model IN [RandomForest, NaiveBayes, LogisticRegression] Train model on TrainingSet Predict on TestSet IF prediction == “successful” then Evaluate: Accuracy, Precision, Recall, F1 ELSE Log Error: “Model Prediction Failed” ENDIF ENDFOR |
12. Evaluation Metrics
| Evaluation Metrics | Random Forest (%) | Logistic Regression (%) | Naive Bayes (%) |
| Detection Accuracy | 99.88 | 91.61 | 87.62 |
| Precision | 99.93 | 92.53 | 83.57 |
| Recall | 99.81 | 91.61 | 89.30 |
| F1 Score | 99.87 | 90.89 | 87.40 |













13. Conclusion and Future Work
14. Future Work
| FS | Feature selection method applied. |
| DDoS | Distributed Denial of Service |
| DNN | Deep Neural Network |
| MLP | Multilayer Perceptron |
| NB | Naïve Bayes |
| LR | Logistics Regression |
| RF | Random Forest |
| ML | Machine Learning |
| LSTM | Long Short Term Memory |
| IoT | Internet of Things |
| IDS | Intrusion Detection Systems |
| GPU | Graphical Processing Unit |
| ICMP | Internet Control Message Protocol |
| TP | True positives |
| TN | True negatives |
| FP | False positives |
| FN | False negatives |
| Acc | Accuracy of the detection model. |
References
- Ahmad, Ijaz, Zhong Wan, and Ashfaq Ahmad. 2023. “A Big Data Analytics for DDOS Attack Detection Using Optimized Ensemble Framework in Internet of Things.” Internet of Things 23 (October):100825. [CrossRef]
- Aktar, Sharmin, and Abdullah Yasin Nur. 2023. “Towards DDoS Attack Detection Using Deep Learning Approach.” Computers & Security 129 (June):103251. [CrossRef]
- Almadhor, Ahmad, Ali Altalbe, Imen Bouazzi, Abdullah Al Hejaili, and Natalia Kryvinska. 2024. “Strengthening Network DDOS Attack Detection in Heterogeneous IoT Environment with Federated XAI Learning Approach.” Scientific Reports 14 (1): 24322. [CrossRef]
- Alve, Shahran Rahman, Muhammad Zawad Mahmud, Samiha Islam, Md Asaduzzaman Chowdhury, and Jahirul Islam. 2025. “Smart IoT Security: Lightweight Machine Learning Techniques for Multi-Class Attack Detection in IoT Networks.” arXiv. [CrossRef]
- Dachyar, M., Teuku Yuri M. Zagloel, and L. Ranjaliba Saragih. 2019. “Knowledge Growth and Development: Internet of Things (IoT) Research, 2006–2018.” Heliyon 5 (8): e02264. [CrossRef]
- Elgazzar, Khalid, Haytham Khalil, Taghreed Alghamdi, Ahmed Badr, Ghadeer Abdelkader, Abdelrahman Elewah, and Rajkumar Buyya. 2022. “Revisiting the Internet of Things: New Trends, Opportunities and Grand Challenges.” Frontiers in the Internet of Things 1 (November):1073780. [CrossRef]
- Gelgi, Metehan, Yueting Guan, Sanjay Arunachala, Maddi Samba Siva Rao, and Nicola Dragoni. 2024. “Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques.” Sensors 24 (11): 3571. [CrossRef]
- Hariprasad, S. 2022. “Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM.”.
- Hussain, Faisal, Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid U. Fayyaz, Farrukh Shahzad, and Ghalib A. Shah. 2020. “IoT DoS and DDoS Attack Detection Using ResNet.” In 2020 IEEE 23rd International Multitopic Conference (INMIC), 1–6. IEEE. [CrossRef]
- Hussein, AbdelRahman H. 2019. “Internet of Things (IOT): Research Challenges and Future Applications.” International Journal of Advanced Computer Science and Applications 10 (6).
- “Intrusion Detection Systems: NSL-KDD | Saylor Academy.” n.d. Saylor Academy. Accessed January 26, 2025. https://learn.saylor.org/mod/book/view.php?id=29755&chapterid=5443.
- Ismail, Muhammad Ismail Mohmand, Hameed Hussain, Ayaz Ali Khan, Ubaid Ullah, Muhammad Zakarya, Aftab Ahmed, Mushtaq Raza, Izaz Ur Rahman, and Muhammad Haleem. 2022. “A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks.” IEEE Access 10:21443–54. [CrossRef]
- Jullian, Olivia, Beatriz Otero, Eva Rodriguez, Norma Gutierrez, Héctor Antona, and Ramon Canal. 2023. “Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework.” Journal of Network and Systems Management 31 (2): 33. [CrossRef]
- Mahadik, Shalaka, Pranav M. Pawar, and Raja Muthalagu. 2023. “Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT).” Journal of Network and Systems Management 31 (1): 2. [CrossRef]
- Motylinski, Michal, Áine MacDermott, Farkhund Iqbal, and Babar Shah. 2022. “A GPU-Based Machine Learning Approach for Detection of Botnet Attacks.” Computers & Security 123 (December):102918. [CrossRef]
- Mu, Xiaoshao, and Maxwell Fordjour Antwi-Afari. 2024. “The Applications of Internet of Things (IoT) in Industrial Management: A Science Mapping Review.” International Journal of Production Research 62 (5): 1928–52. [CrossRef]
- Nižetić, Sandro, Petar Šolić, Diego López-de-Ipiña González-de-Artaza, and Luigi Patrono. 2020. “Internet of Things (IoT): Opportunities, Issues and Challenges towards a Smart and Sustainable Future.” Journal of Cleaner Production 274 (November):122877. [CrossRef]
- Radouan Ait Mouha, Radouan Ait. 2021. “Internet of Things (IoT).” Journal of Data Analysis and Information Processing 09 (02): 77–101. [CrossRef]
- Revathi, M., V. V. Ramalingam, and B. Amutha. 2021. “A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework.” Wireless Personal Communications, 1–25. [CrossRef]
- Sadek, Ibrahim, Josué Codjo, Shafiq Ul Rehman, and Bessam Abdulrazak. 2022. “Security and Privacy in the Internet of Things Healthcare Systems: Toward a Robust Solution in Real-Life Deployment.” Computer Methods and Programs in Biomedicine Update 2:100071. [CrossRef]
- Sanmorino, Ahmad, Luis Marnisah, and Hendra Di Kesuma. 2024. “Detection of DDoS Attacks Using Fine-Tuned Multi-Layer Perceptron Models.” Engineering, Technology & Applied Science Research 14 (5): 16444–49. [CrossRef]
- Silivery, Arun Kumar, Ram Mohan Rao Kovvur, Ramana Solleti, Lk Suresh Kumar, and Bhukya Madhu. 2023. “A Model for Multi-Attack Classification to Improve Intrusion Detection Performance Using Deep Learning Approaches.” Measurement: Sensors 30 (December):100924. [CrossRef]
- Taherdoost, Hamed. 2023. “Security and Internet of Things: Benefits, Challenges, and Future Perspectives.” Electronics 12 (8): 1901. [CrossRef]



Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).