A Deep Learning-Based Intrusion Detection System using Refined LSTM for DoS Attack Detection
Received: 15 April 2025 | Revised: 30 May 2025 and 18 June 2025 | Accepted: 21 June 2025 | Online: 13 July 2025
Corresponding author: Yousef Alraba'nah
Abstract
The detection of a Denial of Service (DoS) attacks is a key challenge in network security, directly impacting the availability and reliability of networks. Such attacks have to be mitigated by implementing an accurate and timely detection mechanism to ensure the integrity of the network infrastructure. Driven by the shortcomings of conventional attack detection methods and the growing complexity of the network attacks, this work proposes a new customized Long Short-Term Memory (LSTM) model for DoS attacks detection. The proposed deep learning approach utilizes LSTM's strength in learning long-range dependencies in sequential data to model network traffic patterns over time. The effectiveness of the model is evaluated through comparative experiments. The primary outcome is that the proposed LSTM model has improved detection performance across all metrics of precision, recall, F1-score, and accuracy. The results demonstrate that the proposed LSTM architecture is a promising and trustworthy solution for enhancing intrusion detection systems (IDSs) and protecting network systems against DoS attacks.
Keywords:
LSTM, DoS, NSL-KDD, intrusion detection, DLDownloads
References
K. M. Canpolat and I. F. Kilincer, "Boosting Based IDS System for Local Network Intrusions," in 2024 8th International Artificial Intelligence and Data Processing Symposium, Malatya, Turkiye, 2024, pp. 1–6. DOI: https://doi.org/10.1109/IDAP64064.2024.10710953
S. A. Ahmed, E. H. Khalifa, M. Nawaz, F. A. Abdalla, and A. F. A. Mahmoud, "Enhancing Cloud Data Center Security through Deep Learning: A Comparative Analysis of RNN, CNN, and LSTM Models for Anomaly and Intrusion Detection," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 20071–20076, Feb. 2025. DOI: https://doi.org/10.48084/etasr.9445
A. Nuhu, A. F. M. Raffei, M. F. A. Razak, and A. Ahmad, "Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review," Mesopotamian Journal of CyberSecurity, vol. 4, no. 1, pp. 47–70, Apr. 2024. DOI: https://doi.org/10.58496/MJCS/2024/004
N. U. Ain, M. Sardaraz, M. Tahir, M. W. Abo Elsoud, and A. Alourani, "Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach," Sensors, vol. 25, no. 5, Mar. 2025, Art. no. 1346. DOI: https://doi.org/10.3390/s25051346
M. B. Anley, A. Genovese, D. Agostinello, and V. Piuri, "Robust DDoS attack detection with adaptive transfer learning," Computers & Security, vol. 144, Sep. 2024, Art. no. 103962. DOI: https://doi.org/10.1016/j.cose.2024.103962
M. A. I. Mallick and R. Nath, "Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments," World Scientific News, vol. 190, no. 1, pp. 1–69, Jan. 2024.
L. Diana, P. Dini, and D. Paolini, "Overview on Intrusion Detection Systems for Computers Networking Security," Computers, vol. 14, no. 3, Mar. 2025, Art. no. 87. DOI: https://doi.org/10.3390/computers14030087
Q. O. Ahmed, "Machine Learning for Intrusion Detection in Cloud Environments: A Comparative Study," Journal of Artificial Intelligence General science, vol. 6, no. 1, pp. 550–563, Dec. 2024. DOI: https://doi.org/10.60087/jaigs.v6i1.287
Y. Alraba'nah and W. Toghuj, "A deep learning based architecture for malaria parasite detection," Bulletin of Electrical Engineering and Informatics, vol. 13, no. 1, pp. 292–299, Feb. 2024. DOI: https://doi.org/10.11591/eei.v13i1.5485
R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7657
R. Jablaoui and N. Liouane, "Network security based combined CNN-RNN models for IoT intrusion detection system," Peer-to-Peer Networking and Applications, vol. 18, no. 3, Mar. 2025, Art. no. 129. DOI: https://doi.org/10.1007/s12083-025-01944-7
Z. S. Dhahir, "A Hybrid Approach for Efficient DDoS Detection in Network Traffic Using CBLOF-Based Feature Engineering and XGBoost," Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 2, pp. 174–190, Sep. 2024. DOI: https://doi.org/10.62411/faith.2024-33
C. C. Ugwu, O. O. Obe, O. S. Popoọla, and A. O. Adetunmbi, "A Distributed Denial of Service Attack Detection System using Long Short Term Memory with Singular Value Decomposition," in 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), Abuja, Nigeria, 2021, pp. 112–118. DOI: https://doi.org/10.1109/CYBERNIGERIA51635.2021.9428870
M. M. Abualhaj, A. A. Abu-Shareha, M. O. Hiari, Y. Alrabanah, M. Al-Zyoud, and M. A. Alsharaiah, "A Paradigm for DoS Attack Disclosure using Machine Learning Techniques," International Journal of Advanced Computer Science and Applications, vol. 13, no. 3, pp. 192–200, 2022. DOI: https://doi.org/10.14569/IJACSA.2022.0130325
S. Sumathi, R. Rajesh, and S. Lim, "Recurrent and Deep Learning Neural Network Models for DDoS Attack Detection," Journal of Sensors, vol. 2022, no. 1, Sep. 2022, Art. no. 8530312. DOI: https://doi.org/10.1155/2022/8530312
O. Almomani, A. Alsaaidah, A. A. A. Shareha, A. Alzaqebah, and M. Almomani, "Performance Evaluation of Machine Learning Classifiers for Predicting Denial-of-Service Attack in Internet of Things," International Journal of Advanced Computer Science and Applications, vol. 15, no. 1, pp. 263–271, 2024. DOI: https://doi.org/10.14569/IJACSA.2024.0150125
A. F. Al-zubidi, A. K. Farhan, and S. M. Towfek, "Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model," Journal of Intelligent Systems, vol. 33, no. 1, Jan. 2024, Art. no. 20230195. DOI: https://doi.org/10.1515/jisys-2023-0195
H. M. S. Saleeh, H. Marouane, and A. Fakhfakh, "A Novel Deep Learning Approach for Detecting Types of Attacks in the NSL-KDD Dataset," Babylonian Journal of Networking, vol. 2024, pp. 171–181, Sep. 2024. DOI: https://doi.org/10.58496/BJN/2024/017
G. Mohi-ud-din, "NSL-KDD." IEEE DataPort, Dec. 29, 2018.
A. A. Abu-Shareha and M. M. Abualhaj, "Improving Intrusion Detection System Using Feature Weighting," in Soft Computing and Its Engineering Applications: 6th International Conference, icSoftComp 2024, Bangkok, Thailand, 2024, pp. 147–160. DOI: https://doi.org/10.1007/978-3-031-88042-1_12
F. S. Alrayes, M. Zakariah, S. U. Amin, Z. I. Khan, and J. S. Alqurni, "CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset," Computers, Materials & Continua, vol. 79, no. 3, pp. 4319–4347, Jun. 2024. DOI: https://doi.org/10.32604/cmc.2024.050586
V. V. Rama Rao M, A. Rapaka, M. Prasad, R. R. PBV, P. T. Satyanarayana Murty, and K. S. Pokkuluri, "Enhancing Network Security: Leveraging Machine Learning for Intrusion Detection," Journal of Electrical Systems, vol. 20, no. 2, pp. 1555–1562, Apr. 2024. DOI: https://doi.org/10.52783/jes.1460
M. A. Talukder, M. Khalid, and N. Sultana, "A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction," Scientific Reports, vol. 15, no. 1, Feb. 2025, Art. no. 4617. DOI: https://doi.org/10.1038/s41598-025-87028-1
M. Alenazi and S. Mishra, "Cyberatttack Detection and Classification in IIoT systems using XGBoost and Gaussian Naïve Bayes: A Comparative Study," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15074–15082, Aug. 2024. DOI: https://doi.org/10.48084/etasr.7664
S. S. Bamber, A. V. R. Katkuri, S. Sharma, and M. Angurala, "A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system," Computers & Security, vol. 148, Jan. 2025, Art. no. 104146. DOI: https://doi.org/10.1016/j.cose.2024.104146
I. M. Elezmazy and N. N. Mostafa, "Enhanced Network Security using LSTM-Based Autoencoder Models," Artificial Intelligence in Cybersecurity, vol. 1, pp. 60–69, Jun. 2024. DOI: https://doi.org/10.61356/j.aics.2024.1315
H. Yadav and A. Thakkar, "NOA-LSTM: An efficient LSTM cell architecture for time series forecasting," Expert Systems with Applications, vol. 238, no. F, Mar. 2024, Art. no. 122333. DOI: https://doi.org/10.1016/j.eswa.2023.122333
I. D. Mienye, T. G. Swart, and G. Obaido, "Recurrent Neural Networks: A Comprehensive Review of Architectures, Variants, and Applications," Information, vol. 15, no. 9, Sep. 2024, Art. no. 517. DOI: https://doi.org/10.3390/info15090517
Downloads
How to Cite
License
Copyright (c) 2025 Mohammad Hiari, Yousef Alraba'nah, Iyas Qaddara

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
