Araştırma Makalesi

DDoSGedik30K: A Unique Dataset and Advanced Deep Learning Techniques for DDoS Attack Detection

Cilt: 3 Sayı: 2 28 Eylül 2025
PDF İndir
TR EN

DDoSGedik30K: A Unique Dataset and Advanced Deep Learning Techniques for DDoS Attack Detection

Abstract

The rapid advancements in network technologies, along with the increasing volume and scope of data transmitted over networks, have led to a rise in both the intensity and complexity of cyber threats and attacks. One of the most prominent and destructive types of cyberattacks threatening network and system security is the Distributed Denial of Service (DDoS) attack. This study examines the use of deep learning techniques to develop an effective detection mechanism against the growing number of DDoS attacks today. For this purpose, a dataset called DDoSGedik30K, which includes real-world attack scenarios, was created. Using this dataset, a total of 12 models were developed based on Feedforward Neural Network (FFNN) and Long Short-Term Memory (LSTM) deep learning architectures. The fact that all models achieved a 99.9% accuracy rate proves that the proposed dataset is highly effective in detecting DDoS attacks. The dataset and the optimized deep learning models for DDoS attack detection proposed in this study provide a significant contribution to the literature and offer findings that could guide future cybersecurity research.

Keywords

Destekleyen Kurum

Istanbul Gedik University

Proje Numarası

GDK202207-32

Etik Beyan

This work was supported by Scientific Research Projects Coordination Unit of Istanbul Gedik University, Project number “GDK202207-32”.

Kaynakça

  1. [1] Aamir, M., Zaidi, S.M.A., 2019. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. International Journal of Information Security, 18: p. 761-785.
  2. [2] Büyüktanır, B., et al. 2025. DDoS_FL: Federated Learning Architecture Approach against DDoS Attack. Pamukkale University Journal of Engineering Sciences, 31(6), 0-0.
  3. [3] Carl, G., et al., 2006. Denial-of-service attack-detection techniques. IEEE Internet computing, 10(1): p. 82-89.
  4. [4] Anli, Y.A., et al., 2024. DDoS detection in electric vehicle charging stations: A deep learning perspective via CICEV2023 dataset. Internet of Things, 28: p. 101343.
  5. [5] Mitrokotsa, A. Douligeris, C., 2007. Denial-of-service attacks. Network Security: Current Status and Future Directions, p. 117-134.
  6. [6] Özocak, G., 2012. DDoS Saldırısı ve Failin Cezai Sorumluluğu. Bilişim, 28: p. 23.
  7. [7] Feily, M., Shahrestani, A., Ramadass, S., 2009. A survey of botnet and botnet detection. in 2009 Third International Conference on Emerging Security Information, Systems and Technologies. IEEE.
  8. [8] Dayanandam, G., et al., 2019. DDoS attacks—analysis and prevention. in Innovations in Computer Science and Engineering: Proceedings of the Fifth ICICSE 2017. Springer.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Bilgisayar Sistem Yazılımı , Yazılım Mühendisliği (Diğer)

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

28 Eylül 2025

Gönderilme Tarihi

31 Mayıs 2025

Kabul Tarihi

19 Eylül 2025

Yayımlandığı Sayı

Yıl 2025 Cilt: 3 Sayı: 2

Kaynak Göster

IEEE
[1]Ş. Kocakoyun Aydoğan, T. Pura, Z. Çıplak, ve A. Yıldız, “DDoSGedik30K: A Unique Dataset and Advanced Deep Learning Techniques for DDoS Attack Detection”, IJONFEST, c. 3, sy 2, ss. 86–102, Eyl. 2025, doi: 10.61150/ijonfest.2025030201.

download?token=eyJhdXRoX3JvbGVzIjpbXSwiZW5kcG9pbnQiOiJqb3VybmFsIiwib3JpZ2luYWxuYW1lIjoiYnkucG5nIiwicGF0aCI6IjU1NWYvMDkxOC85OWRjLzY5Y2ZhYjE1MWYyZTkxLjkwMzI5NTI0LnBuZyIsImV4cCI6MTc3NTIyMTAyOSwibm9uY2UiOiI4YmJhZjIyODE1M2U4MWQ2NWJkZDhkZjVjNzlhODI4MSJ9.H6Q7Nn3VeIK8JVb8uxmHB8VC2nvozW8IrZnyVkXfS3Q

International Journal of New Findings in Engineering, Science and Technology (IJONFEST) is published under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This license allows unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.