A Deep Learning-Based Intrusion Detection System using Refined LSTM for DoS Attack Detection

Authors

  • Mohammad Hiari Faculty of Information Technology, Al-Ahliyya Amman University, Amman, Jordan
  • Yousef Alraba'nah Faculty of Information Technology, Al-Ahliyya Amman University, Amman, Jordan
  • Iyas Qaddara Faculty of Information Technology, Al-Ahliyya Amman University, Amman, Jordan
Volume: 15 | Issue: 4 | Pages: 25627-25633 | August 2025 | https://doi.org/10.48084/etasr.11499

Abstract

The detection of a Denial of Service (DoS) attacks is a key challenge in network security, directly impacting the availability and reliability of networks. Such attacks have to be mitigated by implementing an accurate and timely detection mechanism to ensure the integrity of the network infrastructure. Driven by the shortcomings of conventional attack detection methods and the growing complexity of the network attacks, this work proposes a new customized Long Short-Term Memory (LSTM) model for DoS attacks detection. The proposed deep learning approach utilizes LSTM's strength in learning long-range dependencies in sequential data to model network traffic patterns over time. The effectiveness of the model is evaluated through comparative experiments. The primary outcome is that the proposed LSTM model has improved detection performance across all metrics of precision, recall, F1-score, and accuracy. The results demonstrate that the proposed LSTM architecture is a promising and trustworthy solution for enhancing intrusion detection systems (IDSs) and protecting network systems against DoS attacks.

Keywords:

LSTM, DoS, NSL-KDD, intrusion detection, DL

Downloads

Download data is not yet available.

References

K. M. Canpolat and I. F. Kilincer, "Boosting Based IDS System for Local Network Intrusions," in 2024 8th International Artificial Intelligence and Data Processing Symposium, Malatya, Turkiye, 2024, pp. 1–6. DOI: https://doi.org/10.1109/IDAP64064.2024.10710953

S. A. Ahmed, E. H. Khalifa, M. Nawaz, F. A. Abdalla, and A. F. A. Mahmoud, "Enhancing Cloud Data Center Security through Deep Learning: A Comparative Analysis of RNN, CNN, and LSTM Models for Anomaly and Intrusion Detection," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 20071–20076, Feb. 2025. DOI: https://doi.org/10.48084/etasr.9445

A. Nuhu, A. F. M. Raffei, M. F. A. Razak, and A. Ahmad, "Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review," Mesopotamian Journal of CyberSecurity, vol. 4, no. 1, pp. 47–70, Apr. 2024. DOI: https://doi.org/10.58496/MJCS/2024/004

N. U. Ain, M. Sardaraz, M. Tahir, M. W. Abo Elsoud, and A. Alourani, "Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach," Sensors, vol. 25, no. 5, Mar. 2025, Art. no. 1346. DOI: https://doi.org/10.3390/s25051346

M. B. Anley, A. Genovese, D. Agostinello, and V. Piuri, "Robust DDoS attack detection with adaptive transfer learning," Computers & Security, vol. 144, Sep. 2024, Art. no. 103962. DOI: https://doi.org/10.1016/j.cose.2024.103962

M. A. I. Mallick and R. Nath, "Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments," World Scientific News, vol. 190, no. 1, pp. 1–69, Jan. 2024.

L. Diana, P. Dini, and D. Paolini, "Overview on Intrusion Detection Systems for Computers Networking Security," Computers, vol. 14, no. 3, Mar. 2025, Art. no. 87. DOI: https://doi.org/10.3390/computers14030087

Q. O. Ahmed, "Machine Learning for Intrusion Detection in Cloud Environments: A Comparative Study," Journal of Artificial Intelligence General science, vol. 6, no. 1, pp. 550–563, Dec. 2024. DOI: https://doi.org/10.60087/jaigs.v6i1.287

Y. Alraba'nah and W. Toghuj, "A deep learning based architecture for malaria parasite detection," Bulletin of Electrical Engineering and Informatics, vol. 13, no. 1, pp. 292–299, Feb. 2024. DOI: https://doi.org/10.11591/eei.v13i1.5485

R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7657

R. Jablaoui and N. Liouane, "Network security based combined CNN-RNN models for IoT intrusion detection system," Peer-to-Peer Networking and Applications, vol. 18, no. 3, Mar. 2025, Art. no. 129. DOI: https://doi.org/10.1007/s12083-025-01944-7

Z. S. Dhahir, "A Hybrid Approach for Efficient DDoS Detection in Network Traffic Using CBLOF-Based Feature Engineering and XGBoost," Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 2, pp. 174–190, Sep. 2024. DOI: https://doi.org/10.62411/faith.2024-33

C. C. Ugwu, O. O. Obe, O. S. Popoọla, and A. O. Adetunmbi, "A Distributed Denial of Service Attack Detection System using Long Short Term Memory with Singular Value Decomposition," in 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), Abuja, Nigeria, 2021, pp. 112–118. DOI: https://doi.org/10.1109/CYBERNIGERIA51635.2021.9428870

M. M. Abualhaj, A. A. Abu-Shareha, M. O. Hiari, Y. Alrabanah, M. Al-Zyoud, and M. A. Alsharaiah, "A Paradigm for DoS Attack Disclosure using Machine Learning Techniques," International Journal of Advanced Computer Science and Applications, vol. 13, no. 3, pp. 192–200, 2022. DOI: https://doi.org/10.14569/IJACSA.2022.0130325

S. Sumathi, R. Rajesh, and S. Lim, "Recurrent and Deep Learning Neural Network Models for DDoS Attack Detection," Journal of Sensors, vol. 2022, no. 1, Sep. 2022, Art. no. 8530312. DOI: https://doi.org/10.1155/2022/8530312

O. Almomani, A. Alsaaidah, A. A. A. Shareha, A. Alzaqebah, and M. Almomani, "Performance Evaluation of Machine Learning Classifiers for Predicting Denial-of-Service Attack in Internet of Things," International Journal of Advanced Computer Science and Applications, vol. 15, no. 1, pp. 263–271, 2024. DOI: https://doi.org/10.14569/IJACSA.2024.0150125

A. F. Al-zubidi, A. K. Farhan, and S. M. Towfek, "Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model," Journal of Intelligent Systems, vol. 33, no. 1, Jan. 2024, Art. no. 20230195. DOI: https://doi.org/10.1515/jisys-2023-0195

H. M. S. Saleeh, H. Marouane, and A. Fakhfakh, "A Novel Deep Learning Approach for Detecting Types of Attacks in the NSL-KDD Dataset," Babylonian Journal of Networking, vol. 2024, pp. 171–181, Sep. 2024. DOI: https://doi.org/10.58496/BJN/2024/017

G. Mohi-ud-din, "NSL-KDD." IEEE DataPort, Dec. 29, 2018.

A. A. Abu-Shareha and M. M. Abualhaj, "Improving Intrusion Detection System Using Feature Weighting," in Soft Computing and Its Engineering Applications: 6th International Conference, icSoftComp 2024, Bangkok, Thailand, 2024, pp. 147–160. DOI: https://doi.org/10.1007/978-3-031-88042-1_12

F. S. Alrayes, M. Zakariah, S. U. Amin, Z. I. Khan, and J. S. Alqurni, "CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset," Computers, Materials & Continua, vol. 79, no. 3, pp. 4319–4347, Jun. 2024. DOI: https://doi.org/10.32604/cmc.2024.050586

V. V. Rama Rao M, A. Rapaka, M. Prasad, R. R. PBV, P. T. Satyanarayana Murty, and K. S. Pokkuluri, "Enhancing Network Security: Leveraging Machine Learning for Intrusion Detection," Journal of Electrical Systems, vol. 20, no. 2, pp. 1555–1562, Apr. 2024. DOI: https://doi.org/10.52783/jes.1460

M. A. Talukder, M. Khalid, and N. Sultana, "A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction," Scientific Reports, vol. 15, no. 1, Feb. 2025, Art. no. 4617. DOI: https://doi.org/10.1038/s41598-025-87028-1

M. Alenazi and S. Mishra, "Cyberatttack Detection and Classification in IIoT systems using XGBoost and Gaussian Naïve Bayes: A Comparative Study," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15074–15082, Aug. 2024. DOI: https://doi.org/10.48084/etasr.7664

S. S. Bamber, A. V. R. Katkuri, S. Sharma, and M. Angurala, "A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system," Computers & Security, vol. 148, Jan. 2025, Art. no. 104146. DOI: https://doi.org/10.1016/j.cose.2024.104146

I. M. Elezmazy and N. N. Mostafa, "Enhanced Network Security using LSTM-Based Autoencoder Models," Artificial Intelligence in Cybersecurity, vol. 1, pp. 60–69, Jun. 2024. DOI: https://doi.org/10.61356/j.aics.2024.1315

H. Yadav and A. Thakkar, "NOA-LSTM: An efficient LSTM cell architecture for time series forecasting," Expert Systems with Applications, vol. 238, no. F, Mar. 2024, Art. no. 122333. DOI: https://doi.org/10.1016/j.eswa.2023.122333

I. D. Mienye, T. G. Swart, and G. Obaido, "Recurrent Neural Networks: A Comprehensive Review of Architectures, Variants, and Applications," Information, vol. 15, no. 9, Sep. 2024, Art. no. 517. DOI: https://doi.org/10.3390/info15090517

Downloads

How to Cite

[1]
M. Hiari, Y. Alraba’nah, and I. Qaddara, “A Deep Learning-Based Intrusion Detection System using Refined LSTM for DoS Attack Detection”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 25627–25633, Aug. 2025.

Metrics

Abstract Views: 516
PDF Downloads: 487

Metrics Information