Deep Learning-Based Classification of IoT DDoS Attacks Using CNN-LSTM
DOI:
https://doi.org/10.32628/IJSRST25125248Keywords:
IoT security, DDoS attack detection, CNN-LSTM, deep learning, CICIoT2023 datasetAbstract
The rapid proliferation of Internet of Things (IoT) devices has significantly increased network connectivity and data exchange but has also made IoT ecosystems highly vulnerable to Distributed Denial of Service (DDoS) attacks. These attacks exploit the limited computational capacity of IoT devices, leading to network congestion, service disruption, and potential system failures. To address this growing concern, this study proposes a Deep Learning-based hybrid Convolutional Neural Network and Long Short-Term Memory (CNN-LSTM) model for the accurate classification of IoT DDoS attacks using the CICIoT2023 dataset. The CNN layers are utilized for automated extraction of spatial and local features from network traffic data, while the LSTM layers effectively capture temporal dependencies to improve detection accuracy and robustness. The model is trained and evaluated on preprocessed network flow features under multiple IoT attack scenarios. Experimental results demonstrate that the proposed CNN-LSTM model achieves superior performance compared to traditional deep learning architectures, attaining an accuracy of 95%, precision of 97%, recall of 94%, F1-score of 95%, Matthews Correlation Coefficient (MCC) of 0.95, and an AUC-ROC value of 0.99. These results confirm the model’s ability to effectively distinguish between normal and attack traffic in complex IoT environments. Overall, the proposed approach provides a reliable, scalable, and data-driven framework for securing IoT networks against DDoS attacks, contributing to the development of more resilient and intelligent intrusion detection systems.
Downloads
References
S. Abbas et al., “An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment,” Journal of Supercomputing, vol. 80, no. 10, pp. 13557–13575, 2024, doi: 10.1007/s11227-024-05993-2. DOI: https://doi.org/10.1007/s11227-024-05993-2
A. Behera, K. S. Sahoo, T. K. Mishra, and M. Bhuyan, “A combination learning framework to uncover cyber attacks in IoT networks,” Internet of Things (The Netherlands), vol. 28, no. October, p. 101395, 2024, doi: 10.1016/j.iot.2024.101395. DOI: https://doi.org/10.1016/j.iot.2024.101395
S. Hizal, U. Cavusoglu, and D. Akgun, “A novel deep learning-based intrusion detection system for IoT DDoS security,” Internet of Things (Netherlands), vol. 28, no. April, p. 101336, 2024, doi: 10.1016/j.iot.2024.101336. DOI: https://doi.org/10.1016/j.iot.2024.101336
W. Chen, H. Yang, L. Yin, and X. Luo, “Large-scale IoT attack detection scheme based on LightGBM and feature selection using an improved salp swarm algorithm,” Scientific Reports, vol. 14, no. 1, pp. 1–25, 2024, doi: 10.1038/s41598-024-69968-2. DOI: https://doi.org/10.1038/s41598-024-69968-2
A. I. Jony and A. K. B. Arnob, “Securing the Internet of Things: Evaluating Machine Learning Algorithms for Detecting IoT Cyberattacks Using CIC-IoT2023 Dataset,” International Journal of Information Technology and Computer Science, vol. 16, no. 4, pp. 56–65, 2024, doi: 10.5815/ijitcs.2024.04.04. DOI: https://doi.org/10.5815/ijitcs.2024.04.04
E. Krzysztoń, I. Rojek, and D. Mikołajewski, “A Comparative Analysis of Anomaly Detection Methods in IoT Networks: An Experimental Study,” Applied Sciences, vol. 14, no. 24, p. 11545, Dec. 2024, doi: 10.3390/app142411545. DOI: https://doi.org/10.3390/app142411545
S. F. Fahrezi, A. Nugraha, A. Luthfiarta, and N. D. Primadya, “Optimizing Performance of AdaBoost Algorithm through Undersampling and Hyperparameter Tuning on CICIoT 2023 Dataset,” Techné : Jurnal Ilmiah Elektroteknika, vol. 23, no. 2, pp. 175–184, Nov. 2024, doi: 10.31358/techne.v23i2.467. DOI: https://doi.org/10.31358/techne.v23i2.467
F. L. Becerra-Suarez, V. A. Tuesta-Monteza, H. I. Mejia-Cabrera, and J. Arcila-Diaz, “Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks,” Informatics, vol. 11, no. 2, 2024, doi: 10.3390/informatics11020032. DOI: https://doi.org/10.3390/informatics11020032
R. Ji, N. Kumar, and D. Padha, “Hybrid Enhanced Intrusion Detection Frameworks for Cyber-Physical Systems via Optimal Features Selection,” Indian Journal Of Science And Technology, vol. 17, no. 30, pp. 3069–3079, 2024, doi: 10.17485/ijst/v17i30.1794. DOI: https://doi.org/10.17485/IJST/v17i30.1794
M. M. Khan and M. Alkhathami, “Anomaly detection in IoT-based healthcare: machine learning for enhanced security,” Scientific Reports, vol. 14, no. 1, pp. 1–16, 2024, doi: 10.1038/s41598-024-56126-x. DOI: https://doi.org/10.1038/s41598-024-56126-x
M. A. Elaziz, I. A. Fares, and A. O. Aseeri, “CKAN: Convolutional Kolmogorov-Arnold Networks Model for Intrusion Detection In IoT environment,” IEEE Access, no. September, 2024, doi: 10.1109/ACCESS.2024.3462297. DOI: https://doi.org/10.1109/ACCESS.2024.3462297
S. M. Tseng, Y. Q. Wang, and Y. C. Wang, “Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset,” Future Internet, vol. 16, no. 8, 2024, doi: 10.3390/fi16080284. DOI: https://doi.org/10.3390/fi16080284
J. Chen, J. Xiao, and J. Xu, “VGGIncepNet: Enhancing Network Intrusion Detection and Network Security through Non-Image-to-Image Conversion and Deep Learning,” Electronics, vol. 13, no. 18, p. 3639, Sep. 2024, doi: 10.3390/electronics13183639. DOI: https://doi.org/10.3390/electronics13183639
A. Behera, K. S. Sahoo, T. K. Mishra, A. Nayyar, and M. Bilal, “Enhancing DDoS detection in SDIoT through effective feature selection with SMOTE-ENN,” PLoS ONE, vol. 19, no. 10, pp. 1–29, 2024, doi: 10.1371/journal.pone.0309682. DOI: https://doi.org/10.1371/journal.pone.0309682
A. I. Jony and A. K. B. Arnob, “A long short-term memory based approach for detecting cyber attacks in IoT using CIC-IoT2023 dataset,” Journal of Edge Computing, vol. 3, no. 1, pp. 28–42, 2024, doi: 10.55056/jec.648. DOI: https://doi.org/10.55056/jec.648
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0