Research Article

DDoSGedik30K: A Unique Dataset and Advanced Deep Learning Techniques for DDoS Attack Detection

Volume: 3 Number: 2 September 28, 2025
TR EN

DDoSGedik30K: A Unique Dataset and Advanced Deep Learning Techniques for DDoS Attack Detection

Abstract

The rapid advancements in network technologies, along with the increasing volume and scope of data transmitted over networks, have led to a rise in both the intensity and complexity of cyber threats and attacks. One of the most prominent and destructive types of cyberattacks threatening network and system security is the Distributed Denial of Service (DDoS) attack. This study examines the use of deep learning techniques to develop an effective detection mechanism against the growing number of DDoS attacks today. For this purpose, a dataset called DDoSGedik30K, which includes real-world attack scenarios, was created. Using this dataset, a total of 12 models were developed based on Feedforward Neural Network (FFNN) and Long Short-Term Memory (LSTM) deep learning architectures. The fact that all models achieved a 99.9% accuracy rate proves that the proposed dataset is highly effective in detecting DDoS attacks. The dataset and the optimized deep learning models for DDoS attack detection proposed in this study provide a significant contribution to the literature and offer findings that could guide future cybersecurity research.

Keywords

Supporting Institution

Istanbul Gedik University

Project Number

GDK202207-32

Ethical Statement

This work was supported by Scientific Research Projects Coordination Unit of Istanbul Gedik University, Project number “GDK202207-32”.

References

  1. [1] Aamir, M., Zaidi, S.M.A., 2019. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. International Journal of Information Security, 18: p. 761-785.
  2. [2] Büyüktanır, B., et al. 2025. DDoS_FL: Federated Learning Architecture Approach against DDoS Attack. Pamukkale University Journal of Engineering Sciences, 31(6), 0-0.
  3. [3] Carl, G., et al., 2006. Denial-of-service attack-detection techniques. IEEE Internet computing, 10(1): p. 82-89.
  4. [4] Anli, Y.A., et al., 2024. DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset. Internet of Things, 28: p. 101343.
  5. [5] Mitrokotsa, A. Douligeris, C., 2007. Denial-of-service attacks. Network Security: Current Status and Future Directions, p. 117-134.
  6. [6] Özocak, G., 2012. DDoS Saldırısı ve Failin Cezai Sorumluluğu. Bilişim, 28: p. 23.
  7. [7] Feily, M., Shahrestani, A., Ramadass, S., 2009. A survey of botnet and botnet detection. in 2009 Third International Conference on Emerging Security Information, Systems and Technologies. IEEE.
  8. [8] Dayanandam, G., et al., 2019. DDoS attacks—analysis and prevention. in Innovations in Computer Science and Engineering: Proceedings of the Fifth ICICSE 2017. Springer.

Details

Primary Language

English

Subjects

Computer System Software , Software Engineering (Other)

Journal Section

Research Article

Publication Date

September 28, 2025

Submission Date

May 31, 2025

Acceptance Date

September 19, 2025

Published in Issue

Year 2025 Volume: 3 Number: 2

IEEE
[1]Ş. Kocakoyun Aydoğan, T. Pura, Z. Çıplak, and A. Yıldız, “DDoSGedik30K: A Unique Dataset and Advanced Deep Learning Techniques for DDoS Attack Detection”, IJONFEST, vol. 3, no. 2, pp. 86–102, Sept. 2025, doi: 10.61150/ijonfest.2025030201.

download?token=eyJhdXRoX3JvbGVzIjpbXSwiZW5kcG9pbnQiOiJqb3VybmFsIiwib3JpZ2luYWxuYW1lIjoiYnkucG5nIiwicGF0aCI6IjU1NWYvMDkxOC85OWRjLzY5Y2ZhYjE1MWYyZTkxLjkwMzI5NTI0LnBuZyIsImV4cCI6MTc3NTIyMTAyOSwibm9uY2UiOiI4YmJhZjIyODE1M2U4MWQ2NWJkZDhkZjVjNzlhODI4MSJ9.H6Q7Nn3VeIK8JVb8uxmHB8VC2nvozW8IrZnyVkXfS3Q

International Journal of New Findings in Engineering, Science and Technology (IJONFEST) is published under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This license allows unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.