Enhanced Detection and Classification Models for Distributed Denial-of-Service Using Time-Based Features in Cybersecurity
- Authors
-
-
Yusuf T. BAFFA
Department of Software Engineering, Bayero University, Kano, Nigeria
Author
-
Muhammad Y. MUHAMMAD
Department of Computer Science, Bayero University, Kano, Nigeria
Author
-
Aliyu SHUAIBU
Department of Computer Science, Bayero University, Kano, Nigeria
Author
-
- Keywords:
- Deep Learning, CICDDoS2019, Cybersecurity, DDoS detection, time-based features, multiclassification.
- Abstract
-
Distributed Denial-of-Service (DDoS) attacks continue to pose a critical threat to network infrastructure, necessitating robust, advanced and efficient detection systems. This study explores the application of deep learning (DL) models, specifically DNN, DCNN, CNN-LSTM, and CNN-BiLSTM, into intrusion detection systems (IDS) to enhance their ability to detect and classify diverse DDoS attacks. Utilizing the CICDDoS2019 dataset, a comprehensive pre-processing pipeline was applied, including feature elimination, duplicate and zero-value removal and downsampling to address class imbalance. The dataset was partitioned into binary and multiclass tasks, and two feature sets were analysed: a 70-feature baseline set and a 25-feature time-based set. Experiments were conducted across three scenarios: binary classification (DDoS vs. benign), 12-class attack detection, and 13-class classification (attacks + benign). Key findings demonstrate the integration of time-based features significantly enhanced detection precision for stealthy, low-rate attacks such as UDPLag (F1 = 0.99%), detection recall from 0.9965 to 0.9998 and effectively resolved false positives for attacks like Portmap. CNN-BiLSTM showed superior performance in capturing temporal dependencies, particularly for time-sensitive attacks, achieving 0.99% F1-score (13-class) with 20% FP reduction for UDPLag due to its bidirectional processing capability. The study underscores the importance of temporal feature engineering and the superiority of hybrid deep learning models for robust and scalable DDoS intrusion detection. The findings contribute to advancing deep learning-based IDS frameworks, ensuring improved resilience against evolving cyber threats.
- References
- Downloads
- Published
- 13-09-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Umar A. IBRAHIM, Abdulra’uf G. SHARIFAI, Hybrid CNN Feature Fusion with Optimization for Precision Potato Leaf Disease Classification , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Isiaq O. ALABI, Hassan T. ABDULAZEEZ, Sulaiman AHMAD, Yahaya M. SANI, Scalability Versus Accuracy Trade-offs in Distributed Big Data Processing Frameworks: A Comparative Evaluation of Apache Spark, Flink, and Dask Using Benchmark Datasets , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Olatunde A. AKANO, Wariz A. ISMAEL, Ayomikun A. AWOSEYI, Femi AYO, Ifeoluwa M. OLANIYI, Jide E.T. AKINSOLA, Short Messaging Service Spam Detection Model Using Natural Language Processing and Deep Learning Techniques , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Caleb A. ABORISADE, Jide E.T. AKINSOLA, Ifeoluwa M. OLANIYI, Fathia O. ONIPEDE, Emmanuel A. OLAJUBU, Ganiyu A. ADEROUNMU, Machine Learning-Based Polycystic Ovary Syndrome Generative Modelling via Ensemble Learning and Neural Networks for Infertility Prediction , FUDMA Journal of Engineering and Technology: Vol. 1 No. 1 (2025): July 2025
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Abdulkabiru A. ABDULRAZAQ, Abideen A. ISMAIL, Muhammad S. NAZRUL-ISLAM, Akeem R. ABIOYE, Margaret D. OKPOR, Paschal, U. CHINEDU, Image Denoising: An Overview of Noise Model, Denoising Methods and Applications , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Murtala ISMAIL, Mohammed S. ISMAIL, Eli A. JIYA, Machine Learning-Driven Recruitment Recommendation System for Employment in Nigerian Universities , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Shamsuddeen J. AHMAD, Saifullahi S. SADI, Muhammad M. AHMAD, Abdullahi D. UMAR, Shamsuddeen USMAN, Comparative Analysis of Machine Learning Algorithms for the Detection and Classification of Suspicious Emails , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Zainab B. LAPAI, Joseph A. OJENIYI, Ismail IDRIS, Abdulkadir O. ABDULBAKI, Jennifer BALA, Entropy-Guided Neural Architecture for Family-Level Classification of Windows Ransomware , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Michael R. ADU, Afeez O. OLAWUNMI, Design and Implementation of an IoT-Based Smart Attendance System , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
You may also start an advanced similarity search for this article.
