98%
921
2 minutes
20
The Distributed Denial of Service (DDoS) attack is uncontrollable and appears in different patterns and shapes; accordingly, it is not easily detected and solved with preceding solutions. A DDoS attack is the most serious threat on the Internet. These attacks became a preferred weapon for cyber extortionists, terrorists, and hackers. These attacks can quickly undermine a target, producing massive revenue loss. Classification methods are applied in numerous investigations and have been used to identify and resolve DDoS attacks. Detection of DDoS attacks is problematic in terms of identifying and mitigating them. However, it is valuable as these attacks may lead to big problems. Various methods are presented for attack detection and prevention. However, artificial intelligence (AI)-based Machine learning (ML) and deep learning (DL) methodologies are highly effective for detecting DDoS attacks in cybersecurity. This paper proposes a Cybersecurity-Resource Exhaustion Attack Using Hybrid Deep Learning Model and Metaheuristic Optimizer Algorithms (CREA-HDLMOA) technique. The primary goal of the CREA-HDLMOA technique is to advance an effective method for DDoS attack detection using advanced optimization algorithms. Initially, the data normalization stage leverages linear scaling normalization (LSN) for converting input data into a beneficial format. Furthermore, the feature selection process uses the RIME optimization algorithm (ROA) model to select the most relevant features from the data. In addition, the hybrid of long short-term memory and bidirectional gated recurrent unit (LSTM + Bi-GRU) technique is employed for the DDoS attack classification process. Finally, the modernized pufferfish optimization algorithm (MPOA)-based hyperparameter selection process is performed to optimize the classification results of the LSTM + BiGRU technique. An extensive simulation is performed to validate the performance of the CREA-HDLMOA method under CIC-IDS2017 and Edge-IIoT datasets. The experimental validation of the CREA-HDLMOA method portrayed a superior accuracy value of 99.31% and 99.36% under dual datasets over existing approaches.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12365088 | PMC |
http://dx.doi.org/10.1038/s41598-025-13305-8 | DOI Listing |
Sci Rep
August 2025
Department of Computer Science and Engineering, PSN College of Engineering and Technology, Tirunelveli, Tamil Nadu, 627152, India.
The increasing digitization of the Financial Services Sector (FSS) has significantly improved operational efficiency but has also exposed institutions to sophisticated Cyber Threat Intelligence (CTI) such as Advanced Persistent Threats (APT), zero-day exploits, and high-volume Denial-of-Service (DoS) attacks. Traditional Intrusion Detection Systems (IDS), including signature-based and anomaly-based approaches, suffer from high False Positive Rates (FPR) and lack the adaptability required for modern threat landscapes. This study aims to develop and evaluate an Artificial Intelligence-Enhanced Defense-in-Depth (AI-E-DiD) designed to provide real-time, adaptive, and scalable cybersecurity prevention for financial networks.
View Article and Find Full Text PDFSci Rep
August 2025
Computer Science Department, Faculty of Computers and Information, South Valley University, Qena, 83523, Egypt.
The Distributed Denial of Service (DDoS) attack is uncontrollable and appears in different patterns and shapes; accordingly, it is not easily detected and solved with preceding solutions. A DDoS attack is the most serious threat on the Internet. These attacks became a preferred weapon for cyber extortionists, terrorists, and hackers.
View Article and Find Full Text PDFSci Rep
August 2025
Computer Engineering Department, Umm Al-Qura University, 24381, Mecca, Saudi Arabia.
This paper proposes a scalable and autonomous malware detection and defence architecture in software-defined networks (SDNs) that employs federated learning (FL). This architecture combines SDN's centralized management of potentially significant data streams with FL's decentralized, privacy-preserving learning capabilities in a distributed manner adaptable to varying time and space constraints. This enables a flexible, adaptive design and prevention approach in large-scale, heterogeneous networks.
View Article and Find Full Text PDFSensors (Basel)
August 2025
Department of Computer Science, Cybersecurity and Computing Systems Research Group, University of Hertfordshire, Hertfordshire AL10 9AB, UK.
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. In this paper, we present a Deep Learning (DL)-based Intrusion Detection System (IDS) tailored for IoT environments.
View Article and Find Full Text PDFSci Rep
August 2025
Department of Computer Science, Faculty of Computers and Information, Suez University, P.O.Box:43221, Suez, Egypt.
Deep learning (DL) has emerged as a powerful tool for intelligent cyberattack detection, especially Distributed Denial-of-Service (DDoS) in Software-Defined Networking (SDN), where rapid and accurate traffic classification is essential for ensuring security. This paper presents a comprehensive evaluation of six deep learning models (Multilayer Perceptron (MLP), one-dimensional Convolutional Neural Network (1D-CNN), Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), Recurrent Neural Network (RNN), and a proposed hybrid CNN-GRU model) for binary classification of network traffic into benign or attack classes. The experiments were conducted on an SDN traffic dataset initially exhibiting class imbalance.
View Article and Find Full Text PDF