{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:36:10Z","timestamp":1772771770720,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03643-1","type":"journal-article","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T05:01:26Z","timestamp":1737090086000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Comparative Assessment of Deep Learning for Adaptable DDoS Threat Detection in Cloud Computing Systems"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6157-2059","authenticated-orcid":false,"given":"Sabyasachi","family":"Mazumder","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sayan","family":"Neogy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tapashri","family":"Sur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sahana","family":"Das","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"3643_CR1","first-page":"23","volume":"171","author":"N Amaizu","year":"2021","unstructured":"Amaizu N, Shafiq M, Matrawy A. Deep learning framework for ddos attack detection and mitigation in 5g and b5g networks. Comput Commun. 2021;171:23\u201336.","journal-title":"Comput Commun"},{"key":"3643_CR2","first-page":"225","volume":"86","author":"NB Amma","year":"2019","unstructured":"Amma NB, Subramanian KT. Detecting ddos attacks using novel sketch, vector convolutional auto encoder deep features (svae-df) and random forest classifier. Comput Secur. 2019;86:225\u201346.","journal-title":"Comput Secur"},{"key":"3643_CR3","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1016\/j.future.2018.05.078","volume":"110","author":"M Asad","year":"2020","unstructured":"Asad M, Khan S, Almogren A, Javaid N, Alamri A. Detecting and mitigating ddos attacks using deep learning and blockchain. Futur Gener Comput Syst. 2020;110:422\u201337.","journal-title":"Futur Gener Comput Syst"},{"key":"3643_CR4","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ins.2013.01.021","volume":"233","author":"IB Aydilek","year":"2013","unstructured":"Aydilek IB, Arslan A. A hybrid method for imputation of missing values using optimized fuzzy c-means with support vector regression and a genetic algorithm. Inf Sci. 2013;233:25\u201335.","journal-title":"Inf Sci"},{"key":"3643_CR5","doi-asserted-by":"crossref","unstructured":"Belarbi O, Khan A, Carnelli P, Spyridopoulos T. An intrusion detection system based on deep belief networks, 2022.","DOI":"10.1007\/978-3-031-17551-0_25"},{"key":"3643_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Gal I. Outlier detection. In: Data mining and knowledge discovery handbook, pages 131\u2013146. Springer, Boston, MA, 2005.","DOI":"10.1007\/0-387-25465-X_7"},{"issue":"2","key":"3643_CR7","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra J, Bengio Y. Random search for hyper-parameter optimization. J Mach Learn Res. 2012;13(2):281\u2013305.","journal-title":"J Mach Learn Res"},{"issue":"8","key":"3643_CR8","first-page":"1","volume":"5","author":"M Bogdanoski","year":"2013","unstructured":"Bogdanoski M, Shuminoski T, Risteski A. Analysis of the syn flood dos attack. Int J Comput Netw Inf Secur. 2013;5(8):1.","journal-title":"Int J Comput Netw Inf Secur"},{"key":"3643_CR9","doi-asserted-by":"crossref","unstructured":"Breiman Leo. Bagging predictors. In: Machine learning proceedings 1996, 1996;123\u2013140","DOI":"10.1007\/BF00058655"},{"issue":"1","key":"3643_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L. Random forests. Mach Learn. 2001;45(1):5\u201332.","journal-title":"Mach Learn"},{"key":"3643_CR11","unstructured":"Brownlee J. Clever methods of overfitting time series forecasting models, 2016."},{"key":"3643_CR12","doi-asserted-by":"crossref","first-page":"114141","DOI":"10.1109\/ACCESS.2019.2930564","volume":"7","author":"FO Catak","year":"2019","unstructured":"Catak FO, Mustacoglu AF. A novel statistical method for ddos attack detection. IEEE Access. 2019;7:114141\u201350.","journal-title":"IEEE Access"},{"key":"3643_CR13","unstructured":"Choi J, Jo G-S. Application of deep neural networks for detecting ddos attacks in sdn. 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2019;221\u2013225"},{"key":"3643_CR14","first-page":"227","volume":"183","author":"Z Cil","year":"2021","unstructured":"Cil Z, Yildiz E, Buldu A. Detection of ddos attacks using deep neural network. Procedia Comput Sci. 2021;183:227\u201332.","journal-title":"Procedia Comput Sci"},{"key":"3643_CR15","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/A:1007607513941","volume":"40","author":"TG Dietterich","year":"2000","unstructured":"Dietterich TG. An experimental comparison of three methods for constructing ensembles of decision trees: bagging, boosting, and randomization. Mach Learn. 2000;40:139\u201357.","journal-title":"Mach Learn"},{"key":"3643_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10247-4","volume-title":"Data preprocessing in data mining","author":"S Garc\u2019\u0131a","year":"2015","unstructured":"Garc\u2019\u0131a S, Luengo J, Herrera F. Data preprocessing in data mining. Springer; 2015."},{"key":"3643_CR17","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A. Deep learning. MIT press; 2016."},{"key":"3643_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2","volume-title":"Supervised sequence labelling with recurrent neural networks","author":"A Graves","year":"2012","unstructured":"Graves A. Supervised sequence labelling with recurrent neural networks, vol. 385. Springer; 2012."},{"key":"3643_CR19","doi-asserted-by":"crossref","unstructured":"Graves A, Mohamed A-R, Hinton G. Speech recognition with deep recurrent neural networks. In 2013 IEEE international conference on acoustics, speech and signal processing, pages 6645\u20136649. IEEE, 2013.","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"3643_CR20","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2011","unstructured":"Han J, Pei J, Kamber M. Data mining: concepts and techniques. Elsevier; 2011."},{"key":"3643_CR21","unstructured":"H\u00e4rdle W, Simar L. Applied multivariate statistical analysis, volume 22007. Springer, 2007."},{"issue":"8","key":"3643_CR22","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J. Long short-term memory. Neural Comput. 1997;9(8):1735\u201380.","journal-title":"Neural Comput"},{"issue":"2","key":"3643_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"VJ Hodge","year":"2004","unstructured":"Hodge VJ, Austin J. A survey of outlier detection methodologies. Artif Intell Rev. 2004;22(2):85\u2013126.","journal-title":"Artif Intell Rev"},{"key":"3643_CR24","volume-title":"Principal component analysis","author":"IT Jolliffe","year":"2002","unstructured":"Jolliffe IT. Principal component analysis. Springer; 2002."},{"issue":"2065","key":"3643_CR25","first-page":"20150202","volume":"374","author":"IT Jolliffe","year":"2016","unstructured":"Jolliffe IT, Cadima J. Principal component analysis: a review and recent developments. Philosophical Transactions of the Royal Society A: Mathematical. Phys Eng Sci. 2016;374(2065):20150202.","journal-title":"Phys Eng Sci"},{"key":"3643_CR26","doi-asserted-by":"crossref","unstructured":"J\u00f6nsson P, Wohlin C. An evaluation of k-nearest neighbour imputation using likert data. In Proceedings. 10th International Symposium on Software Metrics, 2004., pages 108\u2013118. IEEE, 2004.","DOI":"10.1109\/METRIC.2004.1357895"},{"key":"3643_CR27","doi-asserted-by":"crossref","unstructured":"Kherif F, Latypova A. Principal component analysis. In: Machine Learning, pages 209\u2013225. Elsevier, 2020.","DOI":"10.1016\/B978-0-12-815739-8.00012-2"},{"key":"3643_CR28","doi-asserted-by":"crossref","unstructured":"Kim Y, Hakak S, Ghorbani A. Ddos attack dataset (cicev2023) against ev authentication in charging infrastructure. In: 2023 20th Annual International Conference on Privacy, Security and Trust (PST), pages 1\u20139, Los Alamitos, CA, USA, 2023. IEEE Computer Society.","DOI":"10.1109\/PST58708.2023.10320202"},{"issue":"3","key":"3643_CR29","first-page":"3","volume":"160","author":"SB Kotsiantis","year":"2007","unstructured":"Kotsiantis SB, Zaharakis I, Pintelas P. Supervised machine learning: a review of classification techniques. Emerg Artif Intell Appl Comput Eng. 2007;160(3):3\u201324.","journal-title":"Emerg Artif Intell Appl Comput Eng"},{"key":"3643_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6849-3","volume-title":"Applied predictive modeling","author":"M Kuhn","year":"2013","unstructured":"Kuhn M, Johnson K, et al. Applied predictive modeling, vol. 26. Springer; 2013."},{"key":"3643_CR31","doi-asserted-by":"publisher","DOI":"10.1002\/9781118914564","volume-title":"Combining pattern classifiers: methods and algorithms","author":"LI Kuncheva","year":"2014","unstructured":"Kuncheva LI. Combining pattern classifiers: methods and algorithms. John Wiley & Sons; 2014."},{"key":"3643_CR32","doi-asserted-by":"crossref","unstructured":"Liang Y, Znati T. Ddos attack detection using lstm neural networks. 2018 IEEE Global Communications Conference, 2019;1\u20136","DOI":"10.1109\/GLOBECOM38437.2019.9013450"},{"issue":"3","key":"3643_CR33","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw A, Wiener M. Classification and regression by randomforest. R News. 2002;2(3):18\u201322.","journal-title":"R News"},{"key":"3643_CR34","unstructured":"Lu Y, Zhu J, Wang S, Gong C. Bidirectional lstm and cnn models for ddos attack detection in vehicular networks. Digital Commun Netw. 2021."},{"issue":"6","key":"3643_CR35","doi-asserted-by":"crossref","first-page":"1967","DOI":"10.3390\/s21061967","volume":"21","author":"D Mac","year":"2021","unstructured":"Mac D, Cheng B, Shi Yu, Chen H, Zhao B. Bilstm-based 5g core network ddos detection with embedding layer. Sensors. 2021;21(6):1967.","journal-title":"Sensors"},{"key":"3643_CR36","unstructured":"Manthena R, Vangipuram R. Ddos attack dataset, 2023."},{"issue":"6","key":"3643_CR37","first-page":"50","volume":"53","author":"P Mell","year":"2011","unstructured":"Mell P, Grance T. The nist definition of cloud computing. Natl Inst Stand Technol. 2011;53(6):50.","journal-title":"Natl Inst Stand Technol"},{"key":"3643_CR38","doi-asserted-by":"publisher","first-page":"13039","DOI":"10.1007\/s00500-021-06608-1","volume":"27","author":"M Mittal","year":"2022","unstructured":"Mittal M, Kumar K, Behal S. Deep learning approaches for detecting ddos attacks: a systematic review. Soft Comput. 2022;27:13039\u201375.","journal-title":"Soft Comput"},{"key":"3643_CR39","unstructured":"Moustafa N. Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic. PhD thesis, UNSW Sydney, 2017."},{"key":"3643_CR40","unstructured":"Muraleedharan JJC, Janet J. A deep neural network based security framework for detecting and preventing slow ddos attacks in digital network. Mater Today: Proc 2021."},{"key":"3643_CR41","unstructured":"Murphey Yi\u00a0L, Wang H, Ou G, Feldkamp LA. OAFO-POFODLNN: An incremental design using simulated evolution applied to neural networks for machine fault diagnosis, volume\u00a063. Elsevier, 2004."},{"key":"3643_CR42","unstructured":"Olah C. Understanding lstm networks, 2015."},{"issue":"3","key":"3643_CR43","doi-asserted-by":"publisher","first-page":"128","DOI":"10.14445\/22312803\/IJCTT-V48P126","volume":"48","author":"FY Osisanwo","year":"2017","unstructured":"Osisanwo FY, Akinsola JET, Awodele O, Hinmikaiye JO, Olakanmi O, Akinjobi J. Supervised machine learning algorithms: classification and comparison. Int J Comput Trends Technol. 2017;48(3):128\u201338.","journal-title":"Int J Comput Trends Technol"},{"issue":"3","key":"3643_CR44","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MCAS.2006.1688199","volume":"6","author":"R Polikar","year":"2006","unstructured":"Polikar R. Ensemble based systems in decision making. IEEE Cir Syst Mag. 2006;6(3):21\u201345.","journal-title":"IEEE Cir Syst Mag"},{"key":"3643_CR45","volume":"102","author":"F Rhama","year":"2021","unstructured":"Rhama F, Alabduljabbar R, Sain M, Elkabani I. Cyber threat detection using deep learning algorithms: a comparative study. Comput Secur. 2021;102: 102165.","journal-title":"Comput Secur"},{"key":"3643_CR46","first-page":"80","volume":"44","author":"M Sabeel","year":"2019","unstructured":"Sabeel M, Anwar F, Zaki MJ. Detection of application layer ddos attack by feature learning using deep models. J Inf Secur Appl. 2019;44:80\u20138.","journal-title":"J Inf Secur Appl"},{"issue":"6","key":"3643_CR47","doi-asserted-by":"crossref","first-page":"2221","DOI":"10.3390\/s22062256","volume":"22","author":"Y Sang","year":"2022","unstructured":"Sang Y, Xu L, Yan Z, Han Z. Ddosdetiot: an iot ddos attack detection model based on cnn-bilstm. Sensors. 2022;22(6):2221.","journal-title":"Sensors"},{"key":"3643_CR48","volume":"41","author":"I Sharafaldin","year":"2022","unstructured":"Sharafaldin I, Qiu A, Yao Z, Addawood A, Gao J, Liao S. Real-time detection of 12 types of attacks on sdn controllers in cloud computing networks. Data Brief. 2022;41: 107457.","journal-title":"Data Brief"},{"key":"3643_CR49","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA. Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), 2019;1\u20138.","DOI":"10.1109\/CCST.2019.8888419"},{"key":"3643_CR50","unstructured":"Siddharth M et\u00a0al. Ddos botnet attack on iot devices, 2020."},{"key":"3643_CR51","unstructured":"Song M, Kim MS, Lee JW, Jeong YS, Park JH. Detecting ddos attacks based on lstm model in sdn environment. 2021 21st International Conference on Advanced Communication Technology (ICACT), 2021; 178\u201383."},{"issue":"1","key":"3643_CR52","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R. Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res. 2014;15(1):1929\u201358.","journal-title":"J Mach Learn Res"},{"issue":"9","key":"3643_CR53","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1016\/j.jpdc.2010.05.006","volume":"70","author":"M Stillwell","year":"2010","unstructured":"Stillwell M, Schanzenbach D, Vivien F, Casanova H. Resource allocation algorithms for virtualized service hosting platforms. J Parallel Distrib Comput. 2010;70(9):962\u201374.","journal-title":"J Parallel Distrib Comput"},{"key":"3643_CR54","unstructured":"Therneau T, Atkinson B, Ripley B, Ripley MB, Team R\u00a0Core. rpart: Recursive partitioning and regression trees, 2015."},{"key":"3643_CR55","volume-title":"Exploratory data analysis","author":"JW Tukey","year":"1977","unstructured":"Tukey JW. Exploratory data analysis. Mass: Reading; 1977."},{"key":"3643_CR56","doi-asserted-by":"crossref","unstructured":"Vinayakumar R, Soman KP, Poornachandrany P. Applying convolutional neural network for network intrusion detection. International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017;1222\u20138.","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"3643_CR57","volume":"89","author":"S Virupakshar","year":"2020","unstructured":"Virupakshar S, Chen L, Kaafar MA. Detection of network anomalies on private cloud using machine learning techniques. Appl Soft Comput. 2020;89: 106067.","journal-title":"Appl Soft Comput"},{"key":"3643_CR58","unstructured":"Wang J, Zhang J, Bai L, Levy R, Zheng Z. Detecting ddos attacks using cnn and lstm models. 2018 IEEE 4th International Conference on Computer and Communications (ICCC), 2019;1135\u201340."},{"issue":"6","key":"3643_CR59","first-page":"1924","volume":"21","author":"Z Wu","year":"2021","unstructured":"Wu Z, Yi J, Huang H, Wang H, Jiang Y. Ddos attack detection method for software defined networks based on convolutional and recurrent neural networks. Sensors. 2021;21(6):1924.","journal-title":"Sensors"},{"issue":"4","key":"3643_CR60","first-page":"2442","volume":"12","author":"P Yi","year":"2022","unstructured":"Yi P, Xing H. An effective ddos attack detection method based on lstm and convolutional capsule network for software defined networks. Appl Sci. 2022;12(4):2442.","journal-title":"Appl Sci"},{"issue":"5","key":"3643_CR61","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1002\/sam.11161","volume":"5","author":"A Zimek","year":"2012","unstructured":"Zimek A, Schubert E, Kriegel H-P. A survey on unsupervised outlier detection in high-dimensional numerical data. Stat Anal Data Min. 2012;5(5):363\u201387.","journal-title":"Stat Anal Data Min"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03643-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03643-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03643-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T05:01:41Z","timestamp":1737090101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03643-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,17]]},"references-count":61,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["3643"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03643-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,17]]},"assertion":[{"value":"3 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"80"}}