Authors:
Preeti,Rajender Nath,DOI NO:
https://doi.org/10.26782/jmcms.2025.12.00004Keywords:
DDoS attacks,Gradient Boosting (GB),IoT security,long short-term memory (LSTM),Abstract
The Internet of Things (IoT) links billions of devices, boosts innovation, shares information effortlessly, and is reshaping various industries. The most common Distributed Denial of Service (DDoS) attacks target all layers in the IoT architecture. Even though easy to execute, these sorts of attacks may severely harm targeted systems and networks. This Novel hybrid model uses Bagged Long Short-Term Memory (LSTM) and Gradient Boosting (GB) to address large dimensionality, various feature dimensions, low classification accuracy, and high false positive rates in raw traffic data to improve IoT security against DDoS attacks. To reduce input information redundancy, the Boruta-Pearson Feature Selector (BPFS) gathers key features as model inputs. The Bagged-LSTM design minimises variance to detect anomalies, while Gradient Boosting improves prediction accuracy. The CIC-ISD2017 and CIC DDoS2019 datasets were used to test the hybrid model. Experimental results show that the recommended model outperforms current models with an accuracy of 99%. It is impossible to completely protect your server from these threats, but by using the techniques discussed here, these attacks can be prevented, and the server can focus on fulfilling legitimate requests rather than unauthentic ones.Refference:
I. Ade, J. V. “Ensemble Learning Methods for DDoS Attack Detection in Cloud Environments: A Comprehensive Review.” International Journal of Science and Engineering Applications, vol. 13, no. 5, 2024, pp. 40–45.
II. Ali, T. E., Chong, Y. W., and S. Manickam. “Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review.” Applied Sciences, vol. 13, no. 5, 2023, p. 3183.
III. Al-kahtani, M. S., Z. Mehmood, T. Sadad, I. Zada, G. Ali, and M. ElAffendi. “Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model.” Intelligent Automation & Soft Computing, vol. 37, no. 2, 2023.
IV. Alkahtani, H., and T. H. Aldhyani. “Botnet Attack Detection by Using CNN‐LSTM Model for Internet of Things Applications.” Security and Communication Networks, vol. 2021, no. 1, 2021, p. 3806459.
V. A. A. “Majority Vote-Based Ensemble Approach for Distributed Denial of Service Attack Detection in Cloud Computing.” Journal of Cyber Security and Mobility, 2022, pp. 265–278.
VI. Bårli, E. M., A. Yazidi, E. H. Viedma, and H. Haugerud. “DoS and DDoS Mitigation Using Variational Autoencoders.” Computer Networks, vol. 199, 2021, p. 108399.
VII. Cheng, J. R., et al. “DDoS Attack Detection via Multi-Scale Convolutional Neural Network.” Computers, Materials & Continua, vol. 62, no. 3, 2020, pp. 1317–1333.
VIII. DDoS Evaluation Dataset (CIC-DDoS2019). University of New Brunswick, Saint John, NB, Canada, 2019.
IX. Goud, K. S., and G. S. Rao. “Towards an Efficient DDoS Attack Detection in SDN: An Approach with CNN-GRU Fusion.” Proceedings of the Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), IEEE, Jan. 2024, pp. 1–10.
X. Issa, A. S. A., and Z. Albayrak. “DDoS Attack Intrusion Detection System Based on Hybridization of CNN and LSTM.” Acta Polytechnica Hungarica, vol. 20, no. 2, 2023, pp. 1–19.
XI. Koay, A., A. Chen, I. Welch, and W. K. G. Seah. “A New Multi-Classifier System Using Entropy-Based Features in DDoS Attack Detection.” Proceedings of the International Conference on Information Networking (ICOIN), Chiang Mai, 2018, pp. 162–167.
XII. Maheshwari, A., B. Mehraj, M. S. Khan, and M. S. Idrisi. “An Optimized Weighted Voting-Based Ensemble Model for DDoS Attack Detection and Mitigation in SDN Environment.” Microprocessors and Microsystems, vol. 89, 2022, p. 104412.
XIII. Mall, R., K. Abhishek, S. Manimurugan, A. Shankar, and A. Kumar. “Stacking Ensemble Approach for DDoS Attack Detection in Software-Defined Cyber–Physical Systems.” Computers and Electrical Engineering, vol. 107, 2023, p. 108635.
XIV. Mittal, M., K. Kumar, and S. Behal. “Deep Learning Approaches for Detecting DDoS Attacks: A Systematic Review.” Soft Computing, vol. 27, no. 18, 2023, pp. 13039–13075.
XV. Muthukumar, S., and A. K. Ashfauk Ahamed. “A Novel Framework of DDoS Attack Detection in Network Using Hybrid Heuristic Deep Learning Approaches with Attention Mechanism.” Journal of High-Speed Networks, Preprint, 2024, pp. 1–27.
XVI. Okey, O. D., S. S. Maidin, P. Adasme, R. Lopes Rosa, M. Saadi, D. Carrillo Melgarejo, and D. Zegarra Rodríguez. “BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning.” Sensors, vol. 22, no. 19, 2022, p. 7409.
XVII. Priyadarshini, I., P. Mohanty, A. Alkhayyat, R. Sharma, and S. Kumar. “SDN and Application Layer DDoS Attacks Detection in IoT Devices by Attention‐Based Bi‐LSTM‐CNN.” Transactions on Emerging Telecommunications Technologies, vol. 34, no. 11, 2023.
XVIII. Singh, C., and A. K. Jain. “A Comprehensive Survey on DDoS Attacks Detection & Mitigation in SDN-IoT Network.” e-Prime – Advances in Electrical Engineering, Electronics and Energy, 2024, p. 100543.
XIX. Subrmanian, M., K. Shanmugavadivel, P. S. Nandhini, and R. Sowmya. “Evaluating the Performance of LSTM and GRU in Detection of Distributed Denial of Service Attacks Using CICDDoS2019 Dataset.” Proceedings of the 7th International Conference on Harmony Search, Soft Computing and Applications: ICHSA 2022, Springer Nature Singapore, Sept. 2022, pp. 395–406.
XX. Tiwari, R. S. “Model Evaluation.” Fundamentals and Methods of Machine and Deep Learning: Algorithms, Tools and Applications, 2022, pp. 33–100.
XXI. Umar, M. A., Z. Chen, K. Shuaib, and Y. Liu. “Effects of Feature Selection and Normalization on Network Intrusion Detection.” Authorea Preprints, 2024.
XXII. Wang, W., Y. Sheng, J. Wang, X. Zeng, X. Ye, Y. Huang, and M. Zhu. “HAST-IDS: Learning Hierarchical Spatial–Temporal Features Using Deep Neural Networks to Improve Intrusion Detection.” IEEE Access, vol. 6, 2018, pp. 1792–1806.
XXIII. Ye, J., X. Cheng, and J. Zhu. “A DDoS Attack Detection Method Based on SVM in Software-Defined Network.” Security and Communication Networks, vol. 4, July 2018, pp. 1–8.
XXIV. Yousuf, O., and R. N. Mir. “DDoS Attack Detection in Internet of Things Using Recurrent Neural Network.” Computers and Electrical Engineering, vol. 101, 2022, p. 108034.
XXV. Yu, P., and C. Li. “DDoS Attack Detection Method Based on Random Forest.” Applied Research in Computers, vol. 34, no. 10, 2017, pp. 3068–3072.
XXVI. Yulianto, A., P. Sukarno, and N. A. Suwastika. “Improving AdaBoost-Based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset.” Journal of Physics: Conference Series, vol. 1192, 2019, art. no. 012018.
XXVII. Zhang, Y., Y. Liu, X. Guo, Z. Liu, X. Zhang, and K. Liang. “A BiLSTM-Based DDoS Attack Detection Method for Edge Computing.” Energies, vol. 15, no. 21, 2022, p. 7882.

