International Journal of Wireless & Mobile Networks (IJWMN), Vol.17, No. 4, August 2025
103
[9] B. Lindemann, T. Müller, H. Vietz, N. Jazdi, and M. Weyrich, “A survey on long short-term
memory networks for time series prediction,” Procedia CIRP, vol. 99, pp. 650–655, 2021.
[10] N. A. Khan, S. N. Brohi, and N. Zaman, “Ten deadly cyber security threats amid COVID-19
pandemic,” May 12, 2020. doi: 10.36227/techrxiv.12278792.v1.
[11] H. Wang and Y. Li, “Overview of DDoS attack detection in software-defined networks,” IEEE
Access, vol. 12, pp. 38351–38381, 2024.
[12] M. Jog, M. Natu, and S. Shelke, “Distributed and predictive-preventive defense against DDoS
attacks,” in Proceedings of the 16th International Conference on Distributed Computing and
Networking, New York, NY, USA: ACM, Jan. 2015. doi: 10.1145/2684464.2684503.
[13] E. Yang, S. Jeong, and C. Seo, “Harnessing feature pruning with optimal deep learning based
DDoS cyberattack detection on IoT environment,” Sci. Rep., vol. 15, no. 1, p. 17516, May 2025.
[14] M. W. Nadeem, H. G. Goh, Y. Aun, and V. Ponnusamy, “A recurrent neural network based
method for low-rate DDoS attack detection in SDN,” in 2022 3rd International Conference on
Artificial Intelligence and Data Sciences (AiDAS), IEEE, Sept. 2022, pp. 13–18.
[15] X. Yuan, C. Li, and X. Li, “DeepDefense: Identifying DDoS attack via deep learning,” in 2017
IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, May 2017. doi:
10.1109/smartcomp.2017.7946998.
[16] V. Hnamte, H. Nhung-Nguyen, J. Hussain, and Y. Hwa-Kim, “A novel two-stage deep learning
model for network intrusion detection: LSTM-AE,” IEEE Access, vol. 11, pp. 37131–37148,
2023.
[17] M. A. Talukder et al., “Machine learning-based network intrusion detection for big and
imbalanced data using oversampling, stacking feature embedding and feature extraction,” J. Big
Data, vol. 11, no. 1, Feb. 2024, doi: 10.1186/s40537-024-00886-w.
[18] B. S. Kiruthika Devi, V. J. Saglani, A. V. Gupta, and T. Subbulakshmi, “Classifying and
predicting DoS and DDoS attacks on cloud services,” in 2018 2nd International Conference on
Trends in Electronics and Informatics (ICOEI) , IEEE, May 2018. doi:
10.1109/icoei.2018.8553889.
[19] R. M. Alguliyev, R. M. Aliguliyev, and F. J. Abdullayeva, “Deep learning method for prediction
of DDoS attacks on social media,” Adv. Data Sci. Adapt. Anal., vol. 11, no. 01n02, p. 1950002,
Apr. 2019.
[20] Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting.
[21] P. Kumar, C. Kushwaha, D. Sethi, D. Ghosh, P. Gupta, and A. Vidyarthi, “Investigating the
performance of multivariate LSTM models to predict the occurrence of Distributed Denial of
Service (DDoS) attack,” PLoS One, vol. 20, no. 1, p. e0313930, Jan. 2025.
[22] Classification Of Network Traffic Using Machine Learning Models On The NETML Dataset.
[23] E. Berei, M. A. Khan, and A. Oun, “Machine learning algorithms for DoS and DDoS cyberattacks
detection in real-time environment,” in 2024 IEEE 21st Consumer Communications & Networking
Conference (CCNC), IEEE, Jan. 2024, pp. 1048–1049.
[24] D. M. A. A. Afraji, J. Lloret, and L. Peñalver, “Deep learning-driven defense strategies for
mitigating DDoS attacks in cloud computing environments,” Cyber Security and Applications, no.
100085, p. 100085, Jan. 2025.
[25] R. K. Gurugubelli, K. Bhukya, and R. Choppa, “Proactive DDoS attacks detection using deep
learning techniques,” IET Conf. Proc., vol. 2024, no. 30, pp. 275–280, Mar. 2025.
[26] H. K. Saini, A. P. Sharma, and G. Kaur, “A Synthesized K-fold approach for Detecting DDoS
attack using Machine Learning Solutions,” in 2023 International Conference on Integrated
Intelligence and Communication Systems (ICIICS), IEEE, Nov. 2023. doi:
10.1109/iciics59993.2023.10420932.
[27] A. Bhardwaj, G. V. B. Subrahmanyam, V. Avasthi, H. Sastry, and S. Goundar, “DDoS attacks,
new DDoS taxonomy and mitigation solutions — A survey,” in 2016 International Conference on
Signal Processing, Communication, Power and Embedded System (SCOPES), IEEE, Oct. 2016.
doi: 10.1109/scopes.2016.7955549.
[28] B. Pranggono and A. Arabo, “COVID ‐19 pandemic cybersecurity issues,” Internet Technol. Lett.,
no. itl2.247, Oct. 2020, doi: 10.1002/itl2.247.
[29] R. Bitit, A. Derhab, M. Guerroumi, and F. A. Khan, “DDoS attack forecasting based on online
multiple change points detection and time series analysis,” Multimed. Tools Appl., vol. 83, no. 18,
pp. 53655–53685, Nov. 2023.