{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:33:43Z","timestamp":1767339223070,"version":"3.41.2"},"reference-count":42,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Info. Know. Mgmt."],"published-print":{"date-parts":[[2023,2]]},"abstract":"<jats:p> In the internet era, network-based services and connected devices are growing with many users, thus it became an increase in the number of cyberattacks. Distributed Denial of Service (DDoS) attacks are the type of cyberattacks increasing their strength and impact on the victim. Effective detection of such attacks through a DDoS Detection System is relatively essential research. Although machine learning techniques have grown in popularity in the field of cybersecurity over the last several years, the change in the attack patterns in recent days shows the need for developing a robust DDoS prediction model. Therefore, we suggested a DDoS prediction system using a two-stage hybrid methodology. Initially, features are extracted by the unsupervised Deep Sparse Autoencoder (DSAE) using Elastic Net regularisation with optimum hyperparameters. Further, several learning models are tuned to classify attacks based on the extracted feature sets. Finally, the models\u2019 performance is analysed with extracted features in balanced and imbalanced data scenarios. The experimental outcomes show that the suggested model outperforms current approaches. The model was evaluated on the CICIDS-2017 and CICDDoS-2019 datasets and achieved an accuracy of 99.98% and 99.99%, respectively. <\/jats:p>","DOI":"10.1142\/s021964922250071x","type":"journal-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T16:23:21Z","timestamp":1658852601000},"source":"Crossref","is-referenced-by-count":9,"title":["A Hybrid Detection System for DDoS Attacks Based on Deep Sparse Autoencoder and Light Gradient Boost Machine"],"prefix":"10.1142","volume":"22","author":[{"given":"Raj Kumar","family":"Batchu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering (SCOPE), VIT-AP University, Near Vijayawada, Andhra Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9822-0009","authenticated-orcid":false,"given":"Hari","family":"Seetha","sequence":"additional","affiliation":[{"name":"Center of Excellence, AI and Robotics, VIT-AP University, Near Vijayawada, Andhra Pradesh, India"}]}],"member":"219","published-online":{"date-parts":[[2022,7,27]]},"reference":[{"issue":"03","key":"S021964922250071XBIB001","doi-asserted-by":"crossref","first-page":"2050026","DOI":"10.1142\/S0219649220500264","volume":"19","author":"Al-Sanjary OI","year":"2020","journal-title":"Journal of Information & Knowledge Management"},{"key":"S021964922250071XBIB002","first-page":"2","author":"Attak H","year":"2018","journal-title":"Space"},{"key":"S021964922250071XBIB003","doi-asserted-by":"crossref","first-page":"108498","DOI":"10.1016\/j.comnet.2021.108498","volume":"200","author":"Batchu RK","year":"2021","journal-title":"Computer Networks"},{"key":"S021964922250071XBIB004","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"issue":"3","key":"S021964922250071XBIB006","doi-asserted-by":"crossref","first-page":"3969","DOI":"10.3233\/JIFS-190159","volume":"37","author":"Catak FO","year":"2019","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"S021964922250071XBIB007","doi-asserted-by":"crossref","first-page":"114520","DOI":"10.1016\/j.eswa.2020.114520","volume":"169","author":"Cil AE","year":"2021","journal-title":"Expert Systems with Applications"},{"key":"S021964922250071XBIB009","doi-asserted-by":"crossref","first-page":"106738","DOI":"10.1016\/j.compeleceng.2020.106738","volume":"86","author":"de Assis MV","year":"2020","journal-title":"Computers & Electrical Engineering"},{"key":"S021964922250071XBIB010","first-page":"2021","author":"Einy S","year":"2021","journal-title":"Mathematical Problems in Engineering"},{"key":"S021964922250071XBIB011","first-page":"391","volume-title":"IEEE 21st Int. Symp. A World of Wireless, Mobile and Multimedia Networks","author":"Elsayed MS","year":"2020"},{"key":"S021964922250071XBIB012","first-page":"178","volume-title":"20th Int. Conf. Advanced Communication Technology","author":"Farahnakian F","year":"2018"},{"key":"S021964922250071XBIB013","unstructured":"Fern\u00e1ndez, A,  S Garc\u00eda,  M Galar,  RC Prati,  B Krawczyk and  F Herrera  [2018]  Learning from Imbalanced Datasets, Vol.  10, pp. 978\u2013973.  Springer:  Berlin."},{"key":"S021964922250071XBIB014","doi-asserted-by":"crossref","first-page":"102419","DOI":"10.1016\/j.jisa.2019.102419","volume":"50","author":"Ferrag MA","year":"2020","journal-title":"Journal of Information Security and Applications"},{"key":"S021964922250071XBIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767"},{"issue":"8","key":"S021964922250071XBIB017","doi-asserted-by":"crossref","first-page":"918","DOI":"10.3390\/electronics10080918","volume":"10","author":"Javeed D","year":"2021","journal-title":"Electronics"},{"issue":"10","key":"S021964922250071XBIB018","doi-asserted-by":"crossref","first-page":"9552","DOI":"10.1109\/JIOT.2020.2993782","volume":"7","author":"Jia Y","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"01","key":"S021964922250071XBIB019","doi-asserted-by":"crossref","first-page":"2040013","DOI":"10.1142\/S0219649220400134","volume":"19","author":"Kamalov F","year":"2020","journal-title":"Journal of Information & Knowledge Management"},{"key":"S021964922250071XBIB020","doi-asserted-by":"crossref","first-page":"107390","DOI":"10.1016\/j.comnet.2020.107390","volume":"180","author":"Kasim \u00d6","year":"2020","journal-title":"Computer Networks"},{"key":"S021964922250071XBIB021","doi-asserted-by":"crossref","first-page":"30373","DOI":"10.1109\/ACCESS.2019.2899721","volume":"7","author":"Khan FA","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"S021964922250071XBIB022","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"Khraisat A","year":"2019","journal-title":"Cybersecurity"},{"key":"S021964922250071XBIB024","doi-asserted-by":"crossref","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","volume":"7","author":"Li Y","year":"2021","journal-title":"Energy Reports"},{"key":"S021964922250071XBIB025","first-page":"205","volume-title":"Int. Forum on Digital TV and Wireless Multimedia Communications","author":"Li Q","year":"2018"},{"key":"S021964922250071XBIB026","doi-asserted-by":"crossref","first-page":"59657","DOI":"10.1109\/ACCESS.2018.2875045","volume":"6","author":"Marir N","year":"2018","journal-title":"IEEE Access"},{"key":"S021964922250071XBIB030","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.jnca.2018.12.006","volume":"128","author":"Moustafa N","year":"2019","journal-title":"Journal of Network and Computer Applications"},{"key":"S021964922250071XBIB032","doi-asserted-by":"crossref","first-page":"83765","DOI":"10.1109\/ACCESS.2020.2992044","volume":"8","author":"Novaes MP","year":"2020","journal-title":"IEEE Access"},{"issue":"2","key":"S021964922250071XBIB033","volume":"12","author":"Nuiaa RR","year":"2022","journal-title":"International Journal of Electrical & Computer Engineering"},{"key":"S021964922250071XBIB034","first-page":"14","author":"Ortet Lopes I","year":"2021","journal-title":"Security and Communication Networks"},{"key":"S021964922250071XBIB036","first-page":"83","volume-title":"5th International Conference on Science in Information Technology","author":"Pujianto U","year":"2019"},{"key":"S021964922250071XBIB037","doi-asserted-by":"crossref","first-page":"19723","DOI":"10.1109\/ACCESS.2021.3054688","volume":"9","author":"Rajagopal S","year":"2021","journal-title":"IEEE Access"},{"key":"S021964922250071XBIB038","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"Ring M","year":"2019","journal-title":"Computers & Security"},{"key":"S021964922250071XBIB039","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/2689746.2689747","volume-title":"Proc. MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis","author":"Sakurada M","year":"2014"},{"issue":"3","key":"S021964922250071XBIB040","first-page":"1","volume":"2","author":"Sarker IH","year":"2021","journal-title":"SN Computer Science"},{"issue":"6","key":"S021964922250071XBIB041","doi-asserted-by":"crossref","first-page":"1-20","DOI":"10.1007\/s42979-021-00815-1","volume":"2","author":"Sarker IH","year":"2021","journal-title":"SN Computer Science"},{"key":"S021964922250071XBIB042","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103770"},{"key":"S021964922250071XBIB043","first-page":"1","volume-title":"Int. Carnahan Conf. Security Technology","author":"Sharafaldin I","year":"2019"},{"key":"S021964922250071XBIB044","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-981-32-9515-5_28","volume-title":"Computing in Engineering and Technology","author":"Sharma A","year":"2020"},{"issue":"11","key":"S021964922250071XBIB045","doi-asserted-by":"crossref","first-page":"5213","DOI":"10.3390\/app11115213","volume":"11","author":"Shieh CS","year":"2021","journal-title":"Applied Sciences"},{"key":"S021964922250071XBIB046","doi-asserted-by":"crossref","first-page":"716-725","DOI":"10.37394\/23203.2020.15.72","volume":"15","author":"Sindian S","year":"2020","journal-title":"WSEAS Transactions on Systems and Control"},{"key":"S021964922250071XBIB047","doi-asserted-by":"crossref","first-page":"102457","DOI":"10.1016\/j.jisa.2020.102457","volume":"51","author":"Singh K","year":"2020","journal-title":"Journal of Information Security and Applications"},{"key":"S021964922250071XBIB048","first-page":"1","volume-title":"Int. Conf. Current Trends towards Converging Technologies","author":"Spelmen VS","year":"2018"},{"issue":"4","key":"S021964922250071XBIB051","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1049\/iet-ifs.2018.5404","volume":"13","author":"Vartouni AM","year":"2019","journal-title":"IET Information Security"},{"key":"S021964922250071XBIB052","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"Vinayakumar R","year":"2019","journal-title":"IEEE Access"},{"key":"S021964922250071XBIB053","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"}],"container-title":["Journal of Information &amp; Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021964922250071X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T03:11:47Z","timestamp":1677467507000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S021964922250071X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":42,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["10.1142\/S021964922250071X"],"URL":"https:\/\/doi.org\/10.1142\/s021964922250071x","relation":{},"ISSN":["0219-6492","1793-6926"],"issn-type":[{"type":"print","value":"0219-6492"},{"type":"electronic","value":"1793-6926"}],"subject":[],"published":{"date-parts":[[2022,7,27]]},"article-number":"2250071"}}