Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    FRF-BiLSTM: Recognising and Mitigating DDoS Attacks through a Secure Decentralized Feature Optimized Federated Learning Approach

    Sushruta Mishra1, Sunil Kumar Mohapatra2, Kshira Sagar Sahoo3, Anand Nayyar4, Tae-Kyung Kim5,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072493 - 12 January 2026

    Abstract With an increase in internet-connected devices and a dependency on online services, the threat of Distributed Denial of Service (DDoS) attacks has become a significant concern in cybersecurity. The proposed system follows a multi-step process, beginning with the collection of datasets from different edge devices and network nodes. To verify its effectiveness, experiments were conducted using the CICDoS2017, NSL-KDD, and CICIDS benchmark datasets alongside other existing models. Recursive feature elimination (RFE) with random forest is used to select features from the CICDDoS2019 dataset, on which a BiLSTM model is trained on local nodes. Local models… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Detection of DDoS Attacks in VANETs for Emergency Vehicle Communication

    Bappa Muktar*, Vincent Fono, Adama Nouboukpo

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4705-4727, 2025, DOI:10.32604/cmc.2025.067733 - 23 October 2025

    Abstract Vehicular Ad Hoc Networks (VANETs) are central to Intelligent Transportation Systems (ITS), especially for real-time communication involving emergency vehicles. Yet, Distributed Denial of Service (DDoS) attacks can disrupt safety-critical channels and undermine reliability. This paper presents a robust, scalable framework for detecting DDoS attacks in highway VANETs. We construct a new dataset with Network Simulator 3 (NS-3) and Simulation of Urban Mobility (SUMO), enriched with real mobility traces from Germany’s A81 highway (OpenStreetMap). Three traffic classes are modeled: DDoS, Voice over IP (VoIP), and Transmission Control Protocol Based (TCP-based) video streaming (VideoTCP). The pipeline includes normalization,… More >

  • Open Access

    ARTICLE

    Adapting Convolutional Autoencoder for DDoS Attack Detection via Joint Reconstruction Learning and Refined Anomaly Scoring

    Seulki Han1, Sangho Son2, Won Sakong2, Haemin Jung3,*

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 2893-2912, 2025, DOI:10.32604/cmc.2025.067211 - 23 September 2025

    Abstract As cyber threats become increasingly sophisticated, Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat to network infrastructure, often disrupting critical services through overwhelming traffic. Although unsupervised anomaly detection using convolutional autoencoders (CAEs) has gained attention for its ability to model normal network behavior without requiring labeled data, conventional CAEs struggle to effectively distinguish between normal and attack traffic due to over-generalized reconstructions and naive anomaly scoring. To address these limitations, we propose CA-CAE, a novel anomaly detection framework designed to improve DDoS detection through asymmetric joint reconstruction learning and refined anomaly scoring. Our… More >

  • Open Access

    ARTICLE

    SDN-Enabled IoT Based Transport Layer DDoS Attacks Detection Using RNNs

    Mohammad Nowsin Amin Sheikh1,2,*, Muhammad Saibtain Raza1, I-Shyan Hwang1,*, Md. Alamgir Hossain3, Ihsan Ullah1, Tahmid Hasan4, Mohammad Syuhaimi Ab-Rahman5

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 4043-4066, 2025, DOI:10.32604/cmc.2025.065850 - 23 September 2025

    Abstract The rapid advancement of the Internet of Things (IoT) has heightened the importance of security, with a notable increase in Distributed Denial-of-Service (DDoS) attacks targeting IoT devices. Network security specialists face the challenge of producing systems to identify and offset these attacks. This research manages IoT security through the emerging Software-Defined Networking (SDN) standard by developing a unified framework (RNN-RYU). We thoroughly assess multiple deep learning frameworks, including Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), Feed-Forward Convolutional Neural Network (FFCNN), and Recurrent Neural Network (RNN), and present the novel usage of Synthetic Minority Over-Sampling More >

  • Open Access

    ARTICLE

    Renovated Random Attribute-Based Fennec Fox Optimized Deep Learning Framework in Low-Rate DoS Attack Detection in IoT

    Prasanalakshmi Balaji1,2, Sangita Babu3, Maode Ma4, Zhaoxi Fang2, Syarifah Bahiyah Rahayu5,6,*, Mariyam Aysha Bivi1, Mahaveerakannan Renganathan7

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5831-5858, 2025, DOI:10.32604/cmc.2025.065260 - 30 July 2025

    Abstract The rapid progression of the Internet of Things (IoT) technology enables its application across various sectors. However, IoT devices typically acquire inadequate computing power and user interfaces, making them susceptible to security threats. One significant risk to cloud networks is Distributed Denial-of-Service (DoS) attacks, where attackers aim to overcome a target system with excessive data and requests. Among these, low-rate DoS (LR-DoS) attacks present a particular challenge to detection. By sending bursts of attacks at irregular intervals, LR-DoS significantly degrades the targeted system’s Quality of Service (QoS). The low-rate nature of these attacks confuses their… More >

  • Open Access

    ARTICLE

    TIDS: Tensor Based Intrusion Detection System (IDS) and Its Application in Large Scale DDoS Attack Detection

    Hanqing Sun1, Xue Li2,*, Qiyuan Fan3, Puming Wang3

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1659-1679, 2025, DOI:10.32604/cmc.2025.061426 - 09 June 2025

    Abstract The era of big data brings new challenges for information network systems (INS), simultaneously offering unprecedented opportunities for advancing intelligent intrusion detection systems. In this work, we propose a data-driven intrusion detection system for Distributed Denial of Service (DDoS) attack detection. The system focuses on intrusion detection from a big data perceptive. As intelligent information processing methods, big data and artificial intelligence have been widely used in information systems. The INS system is an important information system in cyberspace. In advanced INS systems, the network architectures have become more complex. And the smart devices in… More >

  • Open Access

    ARTICLE

    Evaluation and Benchmarking of Cybersecurity DDoS Attacks Detection Models through the Integration of FWZIC and MABAC Methods

    Alaa Mahmood, İsa Avcı*

    Computer Systems Science and Engineering, Vol.49, pp. 401-417, 2025, DOI:10.32604/csse.2025.062413 - 25 April 2025

    Abstract A Distributed Denial-of-Service (DDoS) attack poses a significant challenge in the digital age, disrupting online services with operational and financial consequences. Detecting such attacks requires innovative and effective solutions. The primary challenge lies in selecting the best among several DDoS detection models. This study presents a framework that combines several DDoS detection models and Multiple-Criteria Decision-Making (MCDM) techniques to compare and select the most effective models. The framework integrates a decision matrix from training several models on the CiC-DDOS2019 dataset with Fuzzy Weighted Zero Inconsistency Criterion (FWZIC) and Multi-Attribute Boundary Approximation Area Comparison (MABAC) methodologies.… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique

    Chin-Shiuh Shieh1, Thanh-Lam Nguyen1, Thanh-Tuan Nguyen2,*, Mong-Fong Horng1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4881-4912, 2025, DOI:10.32604/cmc.2025.061001 - 06 March 2025

    Abstract DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity, capable of crippling critical infrastructures and disrupting services globally. As networks continue to expand and threats become more sophisticated, there is an urgent need for Intrusion Detection Systems (IDS) capable of handling these challenges effectively. Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics. This paper presents a novel approach for detecting unknown Distributed Denial of Service (DDoS) attacks by integrating Sliced Iterative Normalizing Flows (SINF) into IDS. SINF utilizes the… More >

  • Open Access

    ARTICLE

    Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks: A Fuzzy Multi-Criteria Decision-Making Approach

    Ahmed Abbas Jasim Al-Hchaimi1, Yousif Raad Muhsen2,3,*, Wisam Hazim Gwad4, Entisar Soliman Alkayal5, Riyadh Rahef Nuiaa Al Ogaili6, Zaid Abdi Alkareem Alyasseri7,8, Alhamzah Alnoor9

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2661-2689, 2025, DOI:10.32604/cmes.2025.061318 - 03 March 2025

    Abstract The implementation of Countermeasure Techniques (CTs) in the context of Network-On-Chip (NoC) based Multiprocessor System-On-Chip (MPSoC) routers against the Flooding Denial-of-Service Attack (F-DoSA) falls under Multi-Criteria Decision-Making (MCDM) due to the three main concerns, called: traffic variations, multiple evaluation criteria-based traffic features, and prioritization NoC routers as an alternative. In this study, we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios. Consequently, an MCDM approach is essential to address these emerging challenges. While the recent MCDM approach has some issues, such as uncertainty, this… More >

  • Open Access

    ARTICLE

    DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm

    Chunhui Li1,2, Xiaoying Wang1,2,*, Qingjie Zhang1,2, Jiaye Liang1, Aijing Zhang1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 645-674, 2025, DOI:10.32604/cmc.2024.058081 - 03 January 2025

    Abstract Previous studies have shown that deep learning is very effective in detecting known attacks. However, when facing unknown attacks, models such as Deep Neural Networks (DNN) combined with Long Short-Term Memory (LSTM), Convolutional Neural Networks (CNN) combined with LSTM, and so on are built by simple stacking, which has the problems of feature loss, low efficiency, and low accuracy. Therefore, this paper proposes an autonomous detection model for Distributed Denial of Service attacks, Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention (MSCNN-BiGRU-SHA), which is based on a Multi-strategy Integrated Zebra Optimization Algorithm (MI-ZOA). The… More >

Displaying 1-10 on page 1 of 51. Per Page