Research Article

Machine Learning Based Hybrid DDoS Attack Prediction

Volume: 15 Number: 2 December 31, 2025
TR EN

Machine Learning Based Hybrid DDoS Attack Prediction

Abstract

In this digitalized world, users of various software systems would like to securely make use of it at every stage from data generation to analysis. However, blocking these services by malicious people is also an undesirable phenomenon in our world. Since Distributed Denial of Service (DDoS) attack detection is important due to its increasing prevalence, this paper presents machine learning and hybrid approaches for DDoS detection. This study was performed on the popular CICIDS2017 and CIC-DDoS2019 datasets used in DDoS attack detection. Also, an alternative hybrid dataset is created by combining these two datasets. This study initially employed Decision Trees (DT), Random Forest (RF), K-Nearest Neighbors (KNN), and Support Vector Machines (SVM) machine learning algorithms on the specified datasets, thereafter conducting a comprehensive assessment of each model's efficacy. We further evaluated the datasets employing hybrid modeling that integrates two machine learning methods to enhance performance, accuracy, and dependability by leveraging their respective strengths. The investigation demonstrated that hybrid models may get an accuracy of up to 99.91% on complex data sets. In our research, we combined two important datasets to construct an alternative to those utilized in existing literature. The hybrid application of machine learning methods markedly enhanced DDoS detection accuracy and optimized performance on complex datasets relative to hybrid versions of established approaches. Moreover, our results aim to improve the efficiency and flexibility of cybersecurity detection techniques and to create a foundation for future research.

Keywords

References

  1. [1] T. B. Doguc and A. A. Aydin, “CAP-based Examination of Popular NoSQL Database Technologies in Streaming Data Processing,” in 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), IEEE, Sep. 2019, pp. 1–6. doi: 10.1109/IDAP.2019.8875874.
  2. [2] T. B. DOGUC and A. A. AYDIN, “Designing a platform for Tweet Collection, Analytics and Storage (TweetCASP),” Computer Science, vol. 55, no. 35, pp. 165–171, Aug. 2023, doi: 10.53070/bbd.1344271.
  3. [3] U. Kekevi and A. A. Aydin, “Real-Time Big Data Processing and Analytics: Concepts, Technologies, and Domains,” Computer Science, vol. 7, no. 2, pp. 111–123, Nov. 2022, doi: 10.53070/bbd.1204112.
  4. [4] A. A. Aydin, “A Comparative Perspective on Technologies of Big Data Value Chain,” IEEE Access, vol. 11, no. October, pp. 112133–112146, 2023, doi: 10.1109/ACCESS.2023.3323160.
  5. [5] F. O. Catak and A. F. Mustacoglu, “Distributed denial of service attack detection using autoencoder and deep neural networks,” Journal of Intelligent & Fuzzy Systems, vol. 37, no. 3, pp. 3969–3979, Oct. 2019, doi: 10.3233/JIFS-190159.
  6. [6] H. A. Alamri and V. Thayananthan, “Bandwidth Control Mechanism and Extreme Gradient Boosting Algorithm for Protecting Software-Defined Networks Against DDoS Attacks,” IEEE Access, vol. 8, pp. 194269–194288, 2020, doi: 10.1109/ACCESS.2020.3033942.
  7. [7] Amit Dogra and Taqdir, “Enhancing DDoS Attack Detection and Network Resilience Through Ensemble-Based Packet Processing and Bandwidth Optimization,” International Research Journal on Advanced Engineering Hub (IRJAEH), vol. 2, no. 04, pp. 930–937, Apr. 2024, doi: 10.47392/IRJAEH.2024.0130.
  8. [8] M. A. Aladaileh, M. Anbar, A. J. Hintaw, I. H. Hasbullah, A. A. Bahashwan, and S. Al-Sarawi, “Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates,” Applied Sciences, vol. 12, no. 12, p. 6127, Jun. 2022, doi: 10.3390/app12126127.

Details

Primary Language

English

Subjects

Computer Software, Software Engineering (Other)

Journal Section

Research Article

Publication Date

December 31, 2025

Submission Date

April 6, 2025

Acceptance Date

June 23, 2025

Published in Issue

Year 2025 Volume: 15 Number: 2

APA
Erdaş, S., Akkaya, A. E., & Aydın, A. A. (2025). Machine Learning Based Hybrid DDoS Attack Prediction. European Journal of Technique (EJT), 15(2), 231-241. https://doi.org/10.36222/ejt.1670798
AMA
1.Erdaş S, Akkaya AE, Aydın AA. Machine Learning Based Hybrid DDoS Attack Prediction. EJT. 2025;15(2):231-241. doi:10.36222/ejt.1670798
Chicago
Erdaş, Selim, Abdullah Erhan Akkaya, and Ahmet Arif Aydın. 2025. “Machine Learning Based Hybrid DDoS Attack Prediction”. European Journal of Technique (EJT) 15 (2): 231-41. https://doi.org/10.36222/ejt.1670798.
EndNote
Erdaş S, Akkaya AE, Aydın AA (December 1, 2025) Machine Learning Based Hybrid DDoS Attack Prediction. European Journal of Technique (EJT) 15 2 231–241.
IEEE
[1]S. Erdaş, A. E. Akkaya, and A. A. Aydın, “Machine Learning Based Hybrid DDoS Attack Prediction”, EJT, vol. 15, no. 2, pp. 231–241, Dec. 2025, doi: 10.36222/ejt.1670798.
ISNAD
Erdaş, Selim - Akkaya, Abdullah Erhan - Aydın, Ahmet Arif. “Machine Learning Based Hybrid DDoS Attack Prediction”. European Journal of Technique (EJT) 15/2 (December 1, 2025): 231-241. https://doi.org/10.36222/ejt.1670798.
JAMA
1.Erdaş S, Akkaya AE, Aydın AA. Machine Learning Based Hybrid DDoS Attack Prediction. EJT. 2025;15:231–241.
MLA
Erdaş, Selim, et al. “Machine Learning Based Hybrid DDoS Attack Prediction”. European Journal of Technique (EJT), vol. 15, no. 2, Dec. 2025, pp. 231-4, doi:10.36222/ejt.1670798.
Vancouver
1.Selim Erdaş, Abdullah Erhan Akkaya, Ahmet Arif Aydın. Machine Learning Based Hybrid DDoS Attack Prediction. EJT. 2025 Dec. 1;15(2):231-4. doi:10.36222/ejt.1670798

All articles published by EJT are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı