Enhanced Detection and Classification Models for Distributed Denial-of-Service Using Time-Based Features in Cybersecurity
- Authors
-
-
Yusuf T. BAFFA
Department of Software Engineering, Bayero University, Kano, Nigeria
Author
-
Muhammad Y. MUHAMMAD
Department of Computer Science, Bayero University, Kano, Nigeria
Author
-
Aliyu SHUAIBU
Department of Computer Science, Bayero University, Kano, Nigeria
Author
-
- Keywords:
- Deep Learning, CICDDoS2019, Cybersecurity, DDoS detection, time-based features, multiclassification.
- Abstract
-
Distributed Denial-of-Service (DDoS) attacks continue to pose a critical threat to network infrastructure, necessitating robust, advanced and efficient detection systems. This study explores the application of deep learning (DL) models, specifically DNN, DCNN, CNN-LSTM, and CNN-BiLSTM, into intrusion detection systems (IDS) to enhance their ability to detect and classify diverse DDoS attacks. Utilizing the CICDDoS2019 dataset, a comprehensive pre-processing pipeline was applied, including feature elimination, duplicate and zero-value removal and downsampling to address class imbalance. The dataset was partitioned into binary and multiclass tasks, and two feature sets were analysed: a 70-feature baseline set and a 25-feature time-based set. Experiments were conducted across three scenarios: binary classification (DDoS vs. benign), 12-class attack detection, and 13-class classification (attacks + benign). Key findings demonstrate the integration of time-based features significantly enhanced detection precision for stealthy, low-rate attacks such as UDPLag (F1 = 0.99%), detection recall from 0.9965 to 0.9998 and effectively resolved false positives for attacks like Portmap. CNN-BiLSTM showed superior performance in capturing temporal dependencies, particularly for time-sensitive attacks, achieving 0.99% F1-score (13-class) with 20% FP reduction for UDPLag due to its bidirectional processing capability. The study underscores the importance of temporal feature engineering and the superiority of hybrid deep learning models for robust and scalable DDoS intrusion detection. The findings contribute to advancing deep learning-based IDS frameworks, ensuring improved resilience against evolving cyber threats.
- References
- Downloads
- Published
- 13-09-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Emma S. EKPO, Mokọ́ládé JOHNSON, Constructing Meaning and Enhancing Well-Being: The Role of Place Attachment, Place Identity, and Sense of Place in Architectural Studio Environments , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Victor A. NSABA, Sabiu B. YUSUF, Kafayat A. IBRAHIM, Consumer Perceptions of Artificial Intelligence (AI)-Driven Smart Grids and Energy Efficiency in Northwest Nigeria’s Power Distribution Sector: A Multi-State Case Study of Sokoto, Kebbi, and Zamfara , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Mokọ́ládé JOHNSON, Bashir SALIM, Enobong EQUERE, Miriam I. CHUKWUMA-UCHEGBU, Emma EKPO, Ali B. ABDULSALAM, Conserving Indigenous Geometries: A Vital Approach to Integrating Cultural Heritage into Architectural Education , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Auwalu M. ABDULLAHI, Musa M. BELLO, Ado HARUNA, Amina I. KHALEEL, Lubabatu B. ILA, Abdurrahaman M. BELLO, Adaptive Hybrid Compliant Control of a Desktop Upper-Limb Rehabilitation Robot , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Bala YAHAYA, Mukhtar N. YAHYA, Characterization of Soil Properties Under Continuous Irrigation Practice , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Koliya LAAYE, Solomon O. OGUCHE, Ibrahim I. JIDDA, Abdullahi A. ADAMU, Economic Viability of Waste-to-Energy: Pathways for Sustainable Power Generation in Jalingo, Taraba State, Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Bala I. ABDULKARIM, Yusuf M. BABA, Suleiman I. ENEHE, Kamoru A. SALAM, Umar IDRISS, Synthesis of Activated Carbon from Corncob for the removal of Lead (Pb²⁺) ions from Aqueous solution using a packed bed Adsorption Column , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Sirajo ALHASSAN, Abdullahi A. ADAMU, Mohammed T. JIMOH, Multi-Criteria Decision Analysis and Optimization Approaches in Sustainable Waste-to-Energy Planning: A Systematic Review , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Suleiman ZUBAIR, Hassan ABDULAZEEZ, Bala A. SALIHU, Abubakar A. SHUAIBU, Design and Implementation of a BLE 5.0-Enabled Wearable Finger Mouse Using the XIAO nRF52840 Platform , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Samuel E. CHUKWU, Martins Y. OTACHE, Precious O. ATEMOAGBO, Emmanuel O. AGBESE, Copula-Based Modelling of Drought Severity-Duration-Frequency Relationship of Sokoto-Rima-River Basin, Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
