This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
F. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, “Intrusion detection systems using long short-term memory (LSTM),” Journal of Big Data, vol. 8, no. 1, 2021.LaghrissiF.DouziS.DouziK.HssinaB.“Intrusion detection systems using long short-term memory (LSTM),”Journal of Big Data812021Search in Google Scholar
“The world’s most valuable resource is no longer oil, but data,” The Economist, [Accessed: 05-Mar-2023].“The world’s most valuable resource is no longer oil, but data,”The Economist[Accessed: 05-Mar-2023].Search in Google Scholar
M. Macas and C. Wu, “Review: Deep learning methods for cyber security and intrusion detection systems,” in 2020 IEEE Latin-American Conference on Communications (LATINCOM).MacasM.WuC.“Review: Deep learning methods for cyber security and intrusion detection systems,”in2020 IEEE Latin-American Conference on Communications (LATINCOM)Search in Google Scholar
A. Rudskoy, A. Borovkov, P. Romanov, and O. Kolosova, “Reducing global risks in the process of transition to the digital economy,” IOP Conference Series: Materials Science and Engineering, vol. 497, p. 012088, 2019.RudskoyA.BorovkovA.RomanovP.KolosovaO.“Reducing global risks in the process of transition to the digital economy,”IOP Conference Series: Materials Science and Engineering4970120882019Search in Google Scholar
A. Kushairi, R. Singh, and M. Ong-Abdullah, “The oil palm industry in malaysia: Thriving with transformative technologies,” Journal of Oil Palm Research, vol. 29, no. 4, pp. 431–439, 2017.KushairiA.SinghR.Ong-AbdullahM.“The oil palm industry in malaysia: Thriving with transformative technologies,”Journal of Oil Palm Research2944314392017Search in Google Scholar
A. Alsirhani, S. Sampalli, and P. Bodorik, “Ddos attack detection system: Utilizing classification algorithms with apache spark,” in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018.AlsirhaniA.SampalliS.BodorikP.“Ddos attack detection system: Utilizing classification algorithms with apache spark,”in2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)2018Search in Google Scholar
O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, “Optimal load distribution for the detection of vm-based ddos attacks in the cloud,” IEEE Transactions on Services Computing, vol. 13, no. 1, pp. 114–129, 2020.WahabO. A.BentaharJ.OtrokH.MouradA.“Optimal load distribution for the detection of vm-based ddos attacks in the cloud,”IEEE Transactions on Services Computing1311141292020Search in Google Scholar
A. Yao, G. Li, X. Li, F. Jiang, J. Xu, and X. Liu, “Differential privacy in edge computing-based smart city applications: Security issues, solutions, and future directions,” Array, 2023.YaoA.LiG.LiX.JiangF.XuJ.LiuX.“Differential privacy in edge computing-based smart city applications: Security issues, solutions, and future directions,”Array2023Search in Google Scholar
R. V. Deshmukh and K. K. Devadkar, “Understanding ddos attack & its effect in cloud environment,” Procedia Computer Science, vol. 49, pp. 202–210, 2015.DeshmukhR. V.DevadkarK. K.“Understanding ddos attack & its effect in cloud environment,”Procedia Computer Science492022102015Search in Google Scholar
D. E. Denning, “An intrusion-detection model,” IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, 1987.DenningD. E.“An intrusion-detection model,”IEEE Transactions on Software EngineeringSE-1322222321987Search in Google Scholar
J. A. Perez-Diaz, I. A. Valdovinos, K.-K. R. Choo, and D. Zhu, “A flexible sdn-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning,” IEEE Access, vol. 8, pp. 155 859–155 872, 2020.Perez-DiazJ. A.ValdovinosI. A.ChooK.-K. R.ZhuD.“A flexible sdn-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning,”IEEE Access8155 859155 8722020Search in Google Scholar
M. S. Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “Ddosnet: A deep-learning model for detecting network attacks,” in 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2020.ElsayedM. S.Le-KhacN.-A.DevS.JurcutA. D.“Ddosnet: A deep-learning model for detecting network attacks,”in2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)2020Search in Google Scholar
P. Verma, S. Tapaswi, and W. W. Godfrey, “An adaptive threshold-based attribute selection to classify requests under ddos attack in cloud-based systems,” Arabian Journal for Science and Engineering, vol. 45, no. 4, pp. 2813–2834, 2020.VermaP.TapaswiS.GodfreyW. W.“An adaptive threshold-based attribute selection to classify requests under ddos attack in cloud-based systems,”Arabian Journal for Science and Engineering454281328342020Search in Google Scholar
Rusyaidi, S. Jaf, and Z. Ibrahim, “Detecting distributed denial of service in network traffic with deep learning,” International Journal of Advanced Computer Science and Applications, vol. 13, pp. 34–41, 2022.RusyaidiJafS.IbrahimZ.“Detecting distributed denial of service in network traffic with deep learning,”International Journal of Advanced Computer Science and Applications1334412022Search in Google Scholar
“Ddos evaluation dataset (cicddos2019),” 2019, [Accessed: 03-05-2023]. [Online]. Available: https://www.unb.ca/cic/datasets/ddos-2019.html“Ddos evaluation dataset (cicddos2019),”2019[Accessed: 03-05-2023]. [Online]. Available: https://www.unb.ca/cic/datasets/ddos-2019.htmlSearch in Google Scholar
“What was the largest ddos attack of all time?” [Accessed: 05-03-2023]. [Online]. Available: https://www.cloudflare.com/learning/ddos/famous-ddos-attacks“What was the largest ddos attack of all time?”[Accessed: 05-03-2023]. [Online]. Available: https://www.cloudflare.com/learning/ddos/famous-ddos-attacksSearch in Google Scholar
M. Alazab, S.-H. Hong, and J. Ng, “Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in australia,” Future Generation Computer Systems, vol. 116, pp. 22–29, 2021.AlazabM.HongS.-H.NgJ.“Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in australia,”Future Generation Computer Systems11622292021Search in Google Scholar
R. Chalapathy and S. Chawla, “Deep learning for anomaly detection: A survey,” 2019.ChalapathyR.ChawlaS.“Deep learning for anomaly detection: A survey,”2019Search in Google Scholar
Y. Jia, F. Zhong, A. Alrawais, B. Gong, and X. Cheng, “Flow-guard: an intelligent edge defense mechanism against ioi ddos attacks,” IEEE Internet of Things Journal, no. 1, 2020.JiaY.ZhongF.AlrawaisA.GongB.ChengX.“Flow-guard: an intelligent edge defense mechanism against ioi ddos attacks,”IEEE Internet of Things Journal12020Search in Google Scholar
Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE Access, vol. 7, pp. 42 210–42 219, 2019.XiaoY.XingC.ZhangT.ZhaoZ.“An intrusion detection model based on feature reduction and convolutional neural networks,”IEEE Access742 21042 2192019Search in Google Scholar
B. Hussain, Q. Du, B. Sun, and Z. Han, “Deep learning-based ddos-attack detection for cyber–physical system over 5g network,” IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 860–870, 2021.HussainB.DuQ.SunB.HanZ.“Deep learning-based ddos-attack detection for cyber–physical system over 5g network,”IEEE Transactions on Industrial Informatics1728608702021Search in Google Scholar
R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinezdel Rincon, and D. Siracusa, “Lucid: A practical, lightweight deep learning solution for ddos attack detection,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 876–889, 2020.Doriguzzi-CorinR.MillarS.Scott-HaywardS.Martinezdel RinconJ.SiracusaD.“Lucid: A practical, lightweight deep learning solution for ddos attack detection,”IEEE Transactions on Network and Service Management1728768892020Search in Google Scholar
L. Wang and Y. Liu, “A ddos attack detection method based on information entropy and deep learning in sdn,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2020.WangL.LiuY.“A ddos attack detection method based on information entropy and deep learning in sdn,”in2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)2020Search in Google Scholar
L. Ma, Y. Chai, L. Cui, D. Ma, Y. Fu, and A. Xiao, “A deep learning-based ddos detection framework for internet of things,” in 2020 IEEE International Conference on Communications (ICC), 2020.MaL.ChaiY.CuiL.MaD.FuY.XiaoA.“A deep learning-based ddos detection framework for internet of things,”in2020 IEEE International Conference on Communications (ICC)2020Search in Google Scholar
J. Kim, J. Kim, H. L. Thu, and H. Kim, “Long short-term memory recurrent neural network classifier for intrusion detection,” in 2016 International Conference on Platform Technology and Service (PlatCon), 2016.KimJ.KimJ.ThuH. L.KimH.“Long short-term memory recurrent neural network classifier for intrusion detection,”in2016 International Conference on Platform Technology and Service (PlatCon)2016Search in Google Scholar
S. Naseer et al., “Enhanced network anomaly detection based on deep neural networks,” IEEE Access, vol. 6, pp. 48 231–48 246, 2018.NaseerS.“Enhanced network anomaly detection based on deep neural networks,”IEEE Access648 23148 2462018Search in Google Scholar
Ö. Aslan, “A methodology to detect distributed denial of service attacks,” Informatics Tech Journal, vol. 15, no. 2, pp. 149–158, 2022.AslanÖ.“A methodology to detect distributed denial of service attacks,”Informatics Tech Journal1521491582022Search in Google Scholar
M. V. Gaur and R. Kumar, “MLSTM: Multiclass long short-term memory based approach for detection of ddos attacks,” Philippine Statistician, vol. 71, no. 3s2, pp. 1375–1394, 2022.GaurM. V.KumarR.“MLSTM: Multiclass long short-term memory based approach for detection of ddos attacks,”Philippine Statistician713s2137513942022Search in Google Scholar
D. Kumar, R. K. Pateriya, R. K. Gupta, V. Dehalwar, and A. Sharma, “Ddos detection using deep learning,” Procedia Computer Science, vol. 218, pp. 2420–2429, 2023.KumarD.PateriyaR. K.GuptaR. K.DehalwarV.SharmaA.“Ddos detection using deep learning,”Procedia Computer Science218242024292023Search in Google Scholar
Sowmya and T. M. Anita, “An intelligent hybrid gapi feature selection technique for network intrusion detection systems,” International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 7s, pp. 718–731, 2023.SowmyaAnitaT. M.“An intelligent hybrid gapi feature selection technique for network intrusion detection systems,”International Journal of Intelligent Systems and Applications in Engineering117s7187312023Search in Google Scholar
L. Y. Ahmed, M. M. Hamdy, and H. Mahmoud, “Improved ddos detection utilizing deep neural networks and feedforward neural networks as auto encoder,” Future Internet, vol. 14, no. 8, pp. 240–248, 2022.AhmedL. Y.HamdyM. M.MahmoudH.“Improved ddos detection utilizing deep neural networks and feedforward neural networks as auto encoder,”Future Internet1482402482022Search in Google Scholar
“Ddos evaluation dataset (cicddos2019),” 2019, [Accessed: 25-03-2023]. [Online]. Available: https://www.unb.ca/cic/datasets/ddos-2019.html“Ddos evaluation dataset (cicddos2019),”2019[Accessed: 25-03-2023]. [Online]. Available: https://www.unb.ca/cic/datasets/ddos-2019.htmlSearch in Google Scholar
M. A. Ferrag, L. Shu, H. Djallel, and K.-K. R. Choo, “Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0,” Electronics (Basel), vol. 10, no. 11, p. 1257, 2021.FerragM. A.ShuL.DjallelH.ChooK.-K. R.“Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0,”Electronics (Basel)101112572021Search in Google Scholar