Abstract
The Distributed Denial of Service (DDoS) attack is uncontrollable and appears in different patterns and shapes; accordingly, it is not easily detected and solved with preceding solutions. A DDoS attack is the most serious threat on the Internet. These attacks became a preferred weapon for cyber extortionists, terrorists, and hackers. These attacks can quickly undermine a target, producing massive revenue loss. Classification methods are applied in numerous investigations and have been used to identify and resolve DDoS attacks. Detection of DDoS attacks is problematic in terms of identifying and mitigating them. However, it is valuable as these attacks may lead to big problems. Various methods are presented for attack detection and prevention. However, artificial intelligence (AI)-based Machine learning (ML) and deep learning (DL) methodologies are highly effective for detecting DDoS attacks in cybersecurity. This paper proposes a Cybersecurity-Resource Exhaustion Attack Using Hybrid Deep Learning Model and Metaheuristic Optimizer Algorithms (CREA-HDLMOA) technique. The primary goal of the CREA-HDLMOA technique is to advance an effective method for DDoS attack detection using advanced optimization algorithms. Initially, the data normalization stage leverages linear scaling normalization (LSN) for converting input data into a beneficial format. Furthermore, the feature selection process uses the RIME optimization algorithm (ROA) model to select the most relevant features from the data. In addition, the hybrid of long short-term memory and bidirectional gated recurrent unit (LSTM + Bi-GRU) technique is employed for the DDoS attack classification process. Finally, the modernized pufferfish optimization algorithm (MPOA)-based hyperparameter selection process is performed to optimize the classification results of the LSTM + BiGRU technique. An extensive simulation is performed to validate the performance of the CREA-HDLMOA method under CIC-IDS2017 and Edge-IIoT datasets. The experimental validation of the CREA-HDLMOA method portrayed a superior accuracy value of 99.31% and 99.36% under dual datasets over existing approaches.
Introduction
DoS attacks have become an undeniably severe challenge on the Internet, whose effects are well-defined in computer network publications1. DoS’s primary goal is to interrupt services by limiting access to a service or machine rather than subverting it. This type of threat focuses on rendering a system unable to provide normal service by aiming at both connectivity and network bandwidth2. These threats attain their objective by sending a target stream of packets which swamps his system or processing ability, denying admittance to his usual clients. Distributed denial-of-service (DDoS) attacks are real attacks on digital, cyberinfrastructure, and networks3. These threats can cause considerable disruptions in a few information communication technology (ICT) frameworks. There are many reasons for launching DDoS threats. These comprise political gains, disruption, and financial gains4. DDoS threats can paralyze services and networks by overwhelming network links, gadgets, and servers with illegal traffic5. Figure 1 signifies the general structure of a resource exhaustion attack. They can cause service degradation, and a complete DoS leads to a massive loss. The growing dependence on data centres and the Internet has forced this concern. An increasing reliance on the vital structure of a country in ICT has given rise to the requirement for effective solutions for safeguarding against DDoS threats. For example, data centres run essential services like smart grids and provide highly reliable services6.
DDoS attacks make online services inaccessible by overwhelming targets with traffic from various attackers. As more businesses migrate to online operations, DDoS threats initiate substantial economic losses. Reports show that the frequency of DDoS attacks has increased recently7. Consequently, quickly and effectively identifying DDoS threats is the most significant concern when measuring the network. Since DDoS attackers are generally distributed throughout the system, coordinated, extensive system monitoring is needed to detect DDoS effectively. For mitigation and timely detection, DDoS recognition should also react rapidly to the beginning of a traffic anomaly8. Relevant publications have been performed in which investigators have projected diverse intrusion detection systems (IDS) to reduce the risk of harmful intrusion threats. In recent times, some detection approaches have been proposed against DDoS threats. Indeed, identifying a DDoS attack is moderately easy at the targeted system, since attack traffic near the target is remarkably overwhelming9. Threats are taken depending on recognizing unusually high traffic with certain classifications. Recognizing DDoS threats is instantly connected to continuous configuration errors and wasted time because of the absence of devices that follow the system’s dynamics without constant human intervention10. In this context, the endorsement of solutions with models depends on artificial intelligence (AI), generally deep learning (DL) and machine learning (ML) models are well-known for providing higher flexibility in the process of classification, thus enhancing the recognition of harmful traffic.
This paper proposes a Cybersecurity-Resource Exhaustion Attack Using Hybrid Deep Learning Model and Metaheuristic Optimizer Algorithms (CREA-HDLMOA) technique. The primary goal of the CREA-HDLMOA technique is to advance an effective method for DDoS attack detection using advanced optimization algorithms. Initially, the data normalization stage leverages linear scaling normalization (LSN) for converting input data into a beneficial format. Furthermore, the feature selection process uses the RIME optimization algorithm (ROA) model to select the most relevant features from the data. In addition, the hybrid of long short-term memory and bidirectional gated recurrent unit (LSTM + Bi-GRU) technique is employed for the DDoS attack classification process. Finally, the modernized pufferfish optimization algorithm (MPOA)-based hyperparameter selection process is performed to optimize the classification results of the LSTM + BiGRU technique. An extensive simulation is performed to validate the performance of the CREA-HDLMOA method under CIC-IDS2017 and Edge-IIoT datasets. The key contribution of the CREA-HDLMOA method is listed below.
-
The CREA-HDLMOA model utilizes the LSN method to scale input features, effectively ensuring consistency across the data. This normalization approach enhances the model’s robustness and prevents issues related to varying feature magnitudes. By standardizing the data, LSN improves the overall performance and accuracy of the DDoS detection system.
-
The CREA-HDLMOA method utilizes the ROA technique for effective feature selection, ensuring that only the most relevant features are used for DDoS detection. This methodology improves the model’s capability to concentrate on critical information, improving detection accuracy. By mitigating complexity, ROA contributes to faster processing and better model generalization.
-
The CREA-HDLMOA approach employs a hybrid of LSTM + Bi-GRU for DDoS classification, integrating sequence learning with bidirectional memory to capture past and future attack patterns. This approach improves the detection of complex attack scenarios and enhances the model’s ability to detect subtle anomalies. The hybrid structure optimizes performance, making it more robust in identifying and classifying diverse DDoS attacks.
-
The CREA-HDLMOA methodology integrates the MPOA model for hyperparameter tuning, improving the model’s performance while maintaining low computational cost. This optimization ensures effective fine-tuning of parameters, resulting in faster convergence and better overall accuracy. The approach mitigates resource consumption without losing detection capabilities, providing scalability in real-time environments.
-
The novelty of the CREA-HDLMOA model is in its unique integration of LSTM + Bi-GRU, which captures both forward and backwards temporal patterns for robust DDoS detection. This is improved by using ROA to select the most discriminative features and MPOA to tune hyperparameters. The hybrid architecture enables precise attack classification with minimal resource consumption.
Related works
Chawla and Bhardwaj11 fully apply a virtualization-based utilization model for employing fuzzing, denial-of-service (DoS), network scanning security threats, and operating systems (OS). Utilizing containerization and virtual machines (VMs), this model provides a structured method for performing security evaluations, allowing security practitioners to emulate real-time threat situations, develop effective mitigation strategies, and recognize vulnerabilities. Mahmood and Avcı12 propose a defence model and effective monitoring to defend, detect, and respond to these threats. The SHAP technology is utilized to understand the model’s behaviour and improve the efficacy of recognition classifiers. The observing mode that depicts the recognition part is instigated when the server load surpasses a predefined threshold. The recognition method integrates 5 ML models. Ali et al.13 projected a Distributed Denial of Service Vision Transformer (DDoSViT) structure. This ViT-based multi-vector DoS and DDoS threat recognition structure transfers the threat into images and trains ViT on the threat image dataset. This article widely inspected different datasets to verify the projected structure, guaranteeing that these comprise multi-vector real attacks and real-time threat scenarios. Xing et al.14 developed a resource-aware DDoS threat reduction structure called RAM, where the feedback in control theory is utilized to adaptively change the communication among incoming requests and accessible cloud resources. In particular, dual indicators comprising maximum cloud workload and request confidence levels are intended. Yadav et al.15 presented an innovative ML-based structure to strengthen SDN against these pervasive attacks, utilizing a synergistic combination of support vector and gradient boosting classifier (SVC-GBC) in a voting classifier schema. This model summarizes this hybrid model’s implementation, design, and severe assessment. Aguru and Erukala16 projected a new anomaly-based IDS structure that employs the stacked modified GRU (mGRU) to identify and detect the Multi-vector DDoS threats in mobile medical care informatics methods. Mohammed et al.17 aimed to develop an anomaly recognition method utilizing ML to reduce DDoS threats in IoT systems. To remove related aspects from the data to effectively characterize abnormal and normal behaviour of the system. ML techniques classify and identify abnormal traffic patterns related to DDoS threats.
Patil and Shivaji18 developed IoT-Guardian, a new method utilizing CNNs to recognize DDoS threats in IoT systems. Unlike traditional methods struggling with the dynamic form of these threats, IoT-Guardian utilizes a CNN framework to effectively examine intricate network traffic patterns. This project integrates several pooling and convolutional layers, synergistically increasing feature extractors, allowing the method to recognize normal and harmful activity more accurately. Sumathi and Rajesh19 proposed a hybrid artificial neural network (ANN)-based IDS named GBS, which integrates grey wolf optimizer (GWO), back propagation network (BPN), and self-organizing map (SOM) to improve detection accuracy and minimize false alarms against Distributed DoS (DDoS) attacks. Panja et al.20 developed an efficient malware detection system using ML, where random forest (RF) and extra tree (ET) classifiers achieved high accuracy and reduced resource usage through feature selection and cross-validation. Sokkalingam and Ramakrishnan21 presented a hybrid ML IDS system using a support vector machine (SVM) optimized with Harris hawks optimization (HHO) and particle swarm optimization (PSO) method for effective DDoS attack detection on the NSL-KDD dataset. Sumathi et al.22 proposed a DL-based IDS system utilizing LSTM and an autoencoder-decoder model, optimized with a hybrid HHO and PSO model for efficient DDoS attack detection. Berguiga et al.23 presented a hybrid DL-based IDS (HIDS-RPL) for detecting DDoS attacks in IoMT networks using CNN for feature extraction and LSTM for sequence prediction. Sumathi and Rajesh24 presented a hybrid IDS system using a backpropagation neural network and a multilayer perceptron (MLP), optimized with HHO and PSO methods for efficient DDoS detection on the NSL-KDD dataset. Sumathi and Rajesh25 aimed to detect TCP SYN flood DDoS attacks using ML and data mining approaches on the CAIDA dataset. Zachos et al.26 presented a hybrid anomaly-based IDS (AIDS) for IoMT networks, employing novelty and outlier detection algorithms. Panja, Yadav, and Nag27 proposed a DL-based anomaly detection model for IoT-enabled smart homes to improve security by detecting malicious activities and protecting against potential cyberattacks. Hota, Panja, and Nag28 presented a lightweight deep convolutional neural network (CNN) for image classification to detect and classify malware in resource-constrained IoT applications efficiently. Chinnasamy et al.29. This research introduces a hybrid honey badger optimization-ANN (HBO-ANN) model for intrusion detection, utilizing feature selection and DL models. Panja et al.30 proposed an anomaly-based detection model using the extended isolation forest method to detect security threats in IoT systems.
While effective in many cases, the existing DDoS and IoT systems studies suffer from limitations such as high computational cost, inadequate handling of dynamic attack vectors, and inability to scale for massive datasets effectively. Several studies mainly focus on detection and fail to present effective mitigation strategies. ML and DL techniques illustrated promising results, but threats remain in balancing detection accuracy with resource constraints, specifically for IoMT and IoT networks. The research gap is developing more lightweight, efficient, and adaptable models for real-time, large-scale data while maintaining high detection performance across varied attack scenarios. Moreover, integrating robust feature selection methods with optimized hybrid models to mitigate false positives and improve detection speed remains an open challenge.
The proposed model
This paper proposes a novel CREA-HDLMOA methodology. Its primary goal is to advance an effective method for DDoS attack detection using advanced optimization algorithms. The methodology involves various processes, such as data normalization, dimensionality reduction, hybrid classification, and parameter selection. Figure 2 represents the workflow of the CREA-HDLMOA model.
Stage I: data normalization
Initially, the data normalization stage employs LSN for converting input data into a beneficial format. This model is chosen for its simplicity, computational efficiency, and ability to scale input features into a uniform range, typically [0,1], which is crucial for accelerating model convergence during training. LSN ensures no feature dominates others due to scale differences, preserving the relative relationships among data points. The model also exhibits efficiency for time-series and DL techniques and does not distort feature distributions. The method also assists in reducing gradient vanishing issues in deep networks by maintaining numerical stability. Compared to more complex normalization techniques, LSN presents minimal overhead, making it ideal for real-time and resource-constrained environments. This makes LSN a perfect choice for pre-processing in DDoS detection tasks.
LSN is an essential pre-processing stage in DDoS attack detection, guaranteeing that networking traffic features are converted to an ordinary scale, usually inside [0,1] or [– 1,1]. This normalization avoids features with large numeric intervals to control those with small choices, resulting in more symmetrical and precise ML methods. During the detection of DDoS, whereas real-time study is essential, normalization improves the efficacy of classifiers by guaranteeing that each feature contributes similarly to the decision-making procedure. It reduces the influence of noise and outliers, making anomaly-based detection models more predictable. Eventually, linear scaling standardization is essential in improving feature representation and enhancing the complete detection precision of DDoS attacks.
Stage II: dimensionality reduction process
Besides, the ROA implements the FS process for selecting the most relevant features from the data31. This model is chosen for its robust global search capability and efficiency in handling high-dimensional feature spaces. The technique replicates the natural rime growth process, enabling it to explore and exploit feature subsets efficiently to detect the most relevant attributes for DDoS detection. This method maintains the semantic integrity of features and does not need data transformation, which is significant for interpretability. The model also shows excellence in dynamically adjusting the selection process based on fitness values, ensuring optimal feature subsets tailored for the classification task. This results in improved model accuracy, faster training, and reduced computational complexity.
RIME is the optimizer model, miming the natural frost formation procedure. Frost formation mainly takes place in two kinds: hard and soft frost. This model utilizes a forward greedy method to repeatedly hunt for the optimum solution, attaining a global optimizer.
During RIME, all frost bodies are considered the individual searching particles inside the model, and the complete frost body population is deliberated as the model’s population. The complete frost body population RRR is initially set to determine the primary mathematical representation, as provided in Eq. (1).
Here, \(\:R\) signifies the original frost body population, and \(\:{x}_{ij}\) characterizes the \(\:jth\) frost particle within the frost crystal \(\:i\). The fitness function \(\:F\left(S\right)\) for the frost body agent is given in Eq. (2).
Here, \(\:f\) signifies the frost particle fitness.
After all frost particles are compressed into soft frost, they transfer based on the particular design, and ecological features influence their efficacy. When the particle surpasses the escape radius, compression cannot take place.
Here: \(\:{R}_{i,j}^{new}\) represents the upgrade location of the particle; \(\:{R}_{best},\) \(\:j\) signifies the \(\:j\:th\) particle of the optimal frost body within the frost population; \(\:{r}_{1}\) means randomly generated numbers inside the interval \(\:\left(-\text{1,1}\right);\theta\:\) specifies the particle movement direction that alterations in all iterations, as exposed in Eq. 6; \(\:\beta\:\) represents ecological aspect, which pretends modifications in the outside atmosphere in iterations to guarantee the model’s convergence, through the convergence equation specified in Eq. (5); \(\:h\) control the central distance among dual elements and is randomly generated numbers inside the interval \(\:\left(\text{0,1}\right);U{b}_{ij}\) and \(\:L{b}_{ij}\) characterize the lower and upper limits of the escaping interval, controlling the particle movement range; \(\:{r}_{2}\) means randomly generated number in the interval of \(\:\left(\text{0,1}\right)\) and, in addition to the attachment coefficient EEE, controls the upgrade of the particle position; \(\:E\) signifies attachment coefficient, which improves with the iteration counts, as stated in Eq. (6).
Now, \(\:t\) represents the present iteration amount; \(\:T\) characterizes the maximal iteration counts; \(\:\left[\right]\) specifies rounding to the closest integer; \(\:w\) refers to segment counts that control the step function.
As the range of soft frost improves, it shows a stronger chance and wide-ranging coverage that enables the fast recognition of the best decomposition parameters. A hard frost penetration mechanism is presented to update the model among agents to stop them from being stuck in local ideals in the optimization procedure. This mechanism allows the particles to exchange through dissimilar local areas, thus enhancing model convergence and avoiding local bests, as exemplified in Eq. (7).
Here: \(\:{F}^{normr}\left(S\right)\) signifies the present standardized fitness value, which designates the likelihood of the \(\:i\:th\) ice particle having swapped; \(\:{r}_{3}\) means a randomly generated number in the interval \(\:\left(-\text{1,1}\right)\). The fitness function (FF) applied in the ROA is established to have a balance amongst the selected feature amounts in every solution (minimal) and the classification precision (maximal) gained by exploiting these chosen features. Equation (8) characterizes the FF to assess solutions.
Whereas \(\:{\gamma\:}_{R}\left(D\right)\) signifies a particular classifier’s classification error rate. \(\:\left|R\right|\:\)denote the cardinality of the chosen subset, and \(\:\left|C\right|\) stands for the total quantity of features in the data set, \(\:\alpha\:\) and \(\:\beta\:\) are dual parameters akin to the significance of subset length and classification quality. ∈ [1, 0] and \(\:\beta\:=1-\alpha\:.\).
Stage III: hybrid attack classification
In addition, the hybrid of the LSTM + BiGRU technique is deployed for the DDoS attack classification process32. This model was chosen because it captures long-range temporal dependencies and contextual information from past and future sequences. BiGRU improves performance by processing data in both forward and backwards directions, enhancing context awareness, and LSTM retains critical patterns over time. Unlike conventional RNNs or standalone models like LSTM or GRU, this hybrid model gives higher accuracy and robustness against sequential data irregularities. The model effectively detects subtle and growing patterns seen in DDoS traffic. Its relatively lower computational complexity than stacked deep models ensures efficiency without compromising accuracy. Figure 3 represents the infrastructure of LSTM + BiGRU.
Initially presented, LSTM, a version of the RNN method, was applied to resolve the disappearance gradient and explosion difficulties challenged by RNN in long-range sequences. It is particularly adjusted to prevent longer‐range dependencies. This method incorporates the powers of BiGRU and LSTM models, making detecting and classifying sequential data especially efficient. LSTM outshines by taking longer-term dependencies inside the data, whereas Bi-GRU provides a more effective manner to take past or future context over its bidirectional structure. This integration enhances the model’s ability to understand composite sequences. This method may offer more precise classifications by incorporating the memory ability of the LSTM and the bidirectional feature of the BiGRU. The hybrid model also alleviates computational efficiency compared to utilizing distinct LSTM or GRU methods, but exploits their powers.
The LSTM attains the best results in longer-time sequences associated with the normal RNN model. The hidden layer (HL) of the unique RNN has a particular layer; therefore, it depends on shorter‐term input. The cell state at the previous time \(\:{C}_{t-1}\), the current input value \(\:{x}_{t}\), and the value of output at the previous time \(\:{h}_{t-1}\) are the three inputs of LSTM. The cell state \(\:{C}_{t}\) and the value of output at the recent time represent dual outputs of the LSTM. The forget gate selects which cell state of the previous time, \(\:{C}_{t-1}\), should be preserved. The LSTM describes the final value of output, \(\:{h}_{t}\). Initially, it assesses the value of the activation state \(\:{f}_{t}\) of the forget gate at the current time \(\:t:\)
Equation (9) \(\:\otimes\:\)represents dot multiplication, and \(\:\sigma\:\left(\bullet\:\right)\) specifies the function of sigmoid. Then, the candidate state values of the input gate \(\:{i}_{t}\), it and input cell \(\:{\stackrel{\sim}{C}}_{t}\) at \(\:t\) time are calculated:
The cell layer’s updated value at the present instant \(\:t\) is achieved:
Finally, the recent predicted variable of the output gate according to the value of the updated cell layer at the current instant \(\:t\) is measured:
A GRU is presented to simplify the LSTM method that effectively alleviates the vanishing gradient problems in the traditional RNN model. Nevertheless, the restrictions of the LSTM component, comprising challenging training and composite parameters, are displayed slowly, limiting the LSTM application. Based on the gating ideas, GRU reformed the architecture of the LSTM component, reducing the training difficulty and calculation time. Similar to the LSTM method, the GRU can successively reach its \(\:{h}_{t}\) HL at the instant \(\:t\) for the input sequences \(\:\left\{{x}_{1},{x}_{2},{x}_{3},{x}_{t},\dots\:{x}_{n}\right\}:\)
Here, \(\:b\) denotes the bias term, \(\:{h}_{t-1}\) specifies the HL state at the instant \(\:t-1,{r}_{t},{z}_{t}\) symbolize the gated state upgraded at the instant, and \(\:\sigma\:\left(\bullet\:\right)\) refers to the function of sigmoid.
Bi-GRU builds dual backwards GRUS, demonstrating time-series data backwards and forward. The result of the time step connects the results of either GRU.
Stage IV: parameter selection process
At last, the MPOA-based hyperparameter selection process is performed to optimize the classification results of the LSTM + BiGRU method33. This model is chosen for its enhanced exploration and exploitation capabilities, which address the challenges of local optima and premature convergence in conventional optimizers. This model adjusts the search process, ensuring optimal convergence speed and solution diversity. The method also presents adaptive and intelligent tuning, resulting in more efficient optimization with mitigated computational overhead. Its robustness and precision make it appropriate for fine-tuning DL methods in complex tasks like DDoS detection.
POA is a new meta-heuristic optimization approach inspired by nature to discover the best solution to the problem. It imitates the individual defensive mechanism of pufferfish. To prevent predators, these incredible animals expand themselves when at risk. The POA mimics this behaviour to avoid local bests and explore the search area more effectively. The pufferfish’s safeguarding behaviour is the primary inspiration for the growth of POA. Pufferfish are smaller in size and have only four teeth. To escape from predators, the pufferfish fill their elastic stomachs with water. After filling massive amounts of water, they turn out spherical ball-shaped fish, and their directed spines become evident. Therefore, the predators cannot touch them. Pufferfish cannot swim rapidly. As a result, this defensive mechanism is vital for their everyday life. Predators are unable to attack these fish after they are spherical. It contains dual stages: the exploitation and the exploration stage. The model \(\:expands\) to examine new selections during this exploration stage by extending its search space. However, in the exploitation phase, it \(\:deflates\) to focus on a small, more promising region when the new area isn’t better. This model progresses toward a better solution found in exploration or exploitation. By balancing exploitation and exploration, POA can recognize possible solutions and direct without less-than-ideal ones. It is applied in various fields, including image processing, engineering, and ML.
The traditional POA processes composite high-dimensional issues, and allocating some controller parameters is unnecessary. However, it has failed to reach the optimal global solution. Thus, an enhanced version of this model is advanced to upgrade its randomly generated number by considering the fitness values. By selecting MPOA, the capability to handle the load balance between nodes is improved, and it guarantees the enhanced survival of WSN. The randomly generated number updated in the presented MPOA is specified in Eq. (19).
Now, the mean fitness value is described by the term \(\:YT\). The terms \(\:RT\) and \(\:KT\) signify the present fitness and poor fitness values. This model is used in Eq. (11). The presented method resolves early convergence and gains a global optimal solution by presenting an improved balance among both stages in the model. The population count of 10 is considered in this paper. For every population, 50 sets of iterations should be implemented. The present fitness function (FF) characterizes the fitness value from the present iteration above all iterations. The fitness value gained from each iteration is enhanced and separated by two to become the mean fitness value. The poor FF is the maximum fitness value attained after finishing each iteration. The presented model resolves early convergence and acquires a global optimal solution by presenting an improved balance between both stages. Current POA may be stuck in the local bests and influence the exploration capability. Updating the random variable enhances the probability of exploring the problem area and decreases the likelihood of becoming trapped in local ideals. Owing to the theory in Eq. (9), the MPOA ability of the algorithm to reflect the objective function is improved. This procedure mainly relies on managing those objective functions and leads to an even more flexible and effective optimizer procedure.
This approach has two modelled phases: the attacking and defending stages.
During this beginning phase of the POA, the positions of the fish are randomly organized. The \(\:{q}^{th}\) member of the pufferfish population is \(\:{P}_{q}\). The lower and upper limit of the decision variable a is designated as \(\:N{P}_{a}\) and \(\:U{P}_{a}\), respectively. A random integer in the range [0,1] is represented as \(\:c\). The whole population is characterized as \(\:F\). According to the \(\:{q}^{th}\) member, an objective function is assessed and named \(\:{D}_{q}\). These functions calculate the quality of all optimum solutions produced by all fish. According to the solution, the best and worst fish are chosen. During all iterations, the position of the optimal member becomes advanced.
During this exploration stage, the predator deliberates on its attack on the pufferfish. The pufferfish’s position changes after it attempts to escape from the predator. The pufferfish population is stated in Eq. (20).
The term \(\:{D}_{b}\) denotes the objective function, and the fish with the enhanced objective function is mentioned as \(\:{P}_{b}\). The candidate pufferfish’s position is referred to as \(\:{M}_{q}\). During this whole population, one fish is randomly attacked by the predator. The new position of pufferfish is projected utilizing Eqs. (21) and (22) are adapted from.
Now, the term \(\:{P}_{q,t}^{pos1}\), describes the new position of the fish. The randomly generated numbers are expressed as \(\:{R}_{q,t}\) and \(\:{c}_{q,t}\). The picked fish by the predator is specified as \(\:P{S}_{q,t}\). The random number is updated through Eq. (19). During this exploitation phase, the fish’s position is updated depending on its defensive approach. Once they saw the sharp spines of pufferfish, the predator didn’t attack the fish. The position of the pufferfish is modified later, and the predator leaves the fish. The new site of the pufferfish is computed utilizing Eqs. (23) and (24).
During the above terms, the iteration count is mentioned as \(\:w\). The new position and objective function are simultaneously stated as \(\:{P}_{q}^{pos2}\) and \(\:{D}_{q}^{pos2}\). In this paper, the reduction of the classification error rate is reflected as the FF, as provided in Eq. (25).
Performance validation
This article experiments with the performance of the CREA-HDLMOA technique on the CIC-IDS2017 dataset from Kaggle34. The dataset holds 30,800 instances with 12 class labels, as defined in Table 1. The total number of features is 78, of which 49 are selected.
Figure 4 illustrates the CREA-HDLMOA methodology’s classifier outcome on the CIC-IDS2017 dataset. Figure 4a and b demonstrates the confusion matrices with accurately identifying 12 classes on a 70%TRASE and 30%TESSE. Figure 4c displays the PR values, indicating superior outcomes over each class. Eventually, Fig. 4d exemplifies the ROC values, signifying capable solutions with better ROC analysis for different class labels.
In Table 2; Fig. 5, the attack identification outcomes of the CREA-HDLMOA approach are depicted for 70%TRASE and 30%TESSE on the CIC-IDS2017 dataset. The result indicates that the CREA-HDLMOA approach can efficaciously recognize the samples. With 70%TRASE, the CREA-HDLMOA technique attains an average \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), \(\:F{1}_{socre}\), and \(\:{AUC}_{score}\) of 99.22%, 94.90%, 93.67%, 94.21%, and 96.62%, respectively. Besides, with 30%TESSE, the CREA-HDLMOA technique attains an average \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), \(\:F{1}_{socre}\), and \(\:{AUC}_{score}\) of 99.31%, 95.41%, 93.67%, 94.38%, and 96.65%, correspondingly.
Figure 6 illustrates the TRA \(\:acc{u}_{y}\) (TRAAY) and validation \(\:acc{u}_{y}\) (VLAAY) graph of the CREA-HDLMOA method on the CIC-IDS2017 dataset. The \(\:acc{u}_{y}\) values are intended across an interval of 0–30 epochs. The TRAAY and VLAAY remain closer over the epochs, specifying minimal over-fitting and demonstrating greater outcome of the CREA-HDLMOA approach, assuring reliable prediction on hidden samples.
Figure 7 shows the TRA loss (TRALO) and VLA loss (VLALO) of the CREA-HDLMOA approach on the CIC-IDS2017 dataset. The loss values are calculated across an interval of 0–30 epochs. The continuous reduction in loss values guarantees the optimal outcomes of the CREA-HDLMOA approach and tunes the prediction solutions over time.
Table 3; Fig. 8, the investigational performance of the CREA-HDLMOA model with recent approaches below the CIC-IDS2017 dataset. The outcomes exhibition that the NB model has exposed minimum performance with \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), and \(\:{F1}_{score}\) of 91.20%, 90.89%, 91.57%, and 90.83%, correspondingly. Meanwhile, the J48 consolidated algorithm has attained slightly increased results with \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), and \(\:{F1}_{score}\) of 91.94%, 93.39%, 92.02%, and 93.59%, correspondingly. Besides, the LIBSVM, MLP, CNN-LSTM, and XGBoost-SVM approaches have accomplished moderately closer performance. Meanwhile, the 5-layer AE method has obtained considerable results with \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), and \(\:{F1}_{score}\) of 98.97%, 90.09%, 92.32%, and 93.18%, respectively. But the CREA-HDLMOA method outperforms existing methodologies with higher \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), and \(\:{F1}_{score}\) of 99.31%, 95.41%, 93.67%, and 94.38%, correspondingly.
This article experiments with the performance of the CREA-HDLMOA approach on the Edge-IIoT dataset from Kaggle35. The dataset comprises 30,800 instances with 12 class labels, as defined in Table 4. The total number of features is 63, of which 43 are selected.
Figure 9 represents the classifier outcomes of the CREA-HDLMOA approach on the Edge-IIoT dataset. Figure 9a and b show the confusion matrices with perfect recognition and classification of all 12 classes on a 70%TRASE and 30%TESSE. Figure 9c shows the PR values, representing maximum results over 12 classes. Followed by, Fig. 9d exhibits the ROC analysis, indicating capable outcomes with high ROC analysis for 12 classes.
Table 5; Fig. 10 show a brief attack detection performance of the CREA-HDLMOA model for 70%TRASE and 30%TESSE on Edge-IIoT dataset. The outcomes specify that the CREA-HDLMOA model can efficaciously identify the samples. With 70%TRASE, the CREA-HDLMOA technique attains an average \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), \(\:F{1}_{socre}\), and \(\:{AUC}_{score}\) of 99.34%, 96.03%, 96.03%, 96.03%, and 97.83%, respectively. Besides, with 30%TESSE, the CREA-HDLMOA technique attains an average \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), \(\:F{1}_{socre}\), and \(\:{AUC}_{score}\) of 99.36%, 96.15%, 96.15%, 96.15%, and 97.90%, correspondingly.
Figure 11 illustrates the TRAAY and VLAAY analysis of the CREA-HDLMOA approach on the Edge-IIoT dataset. The \(\:acc{u}_{y}\) analysis is calculated across a period of 0–30 epochs. Followed by, the TRAAY and VLAAY remain closer over the epochs, which denotes minimal overfitting and demonstrates superior performance of the CREA-HDLMOA model, ensuring continuous prediction on hidden samples.
Figure 12 shows the TRALO and VLALO analysis of the CREA-HDLMOA methodology on the Edge-IIoT dataset. The loss values are computed over a time of 0–30 epochs. The continuous decrease in loss values likewise assures the maximum outcome of the CREA-HDLMOA model and tunes the prediction performance over time.
Table 6; Fig. 13 show the stimulated performance of the CREA-HDLMOA with recent techniques under the Edge-IIoT dataset36,37,38,39. The outcomes display that the Gradient Boosting model has shown lesser performance with \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), and \(\:{F1}_{score}\) of 91.94%, 95.91%, 94.17%, and 92.53%, respectively. At the same time, the DT technique has obtained slightly greater outcomes with \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), and \(\:{F1}_{score}\) of 94.62%, 94.02%, 92.96%, and 92.44%, correspondingly. Besides, the 1DCNN, SVM, kNN, and SVM techniques have reached moderately closer performance. Meanwhile, the 5-layer DNN technique has considerable results with \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), and \(\:{F1}_{score}\) of 98.10%, 93.19%, 90.62%, and 94.41%, correspondingly. But the CREA-HDLMOA approach outperforms the other techniques with higher \(\:acc{u}_{y}\), \(\:pre{c}_{n}\), \(\:rec{a}_{l}\), and \(\:{F1}_{score}\) of 99.36%, 96.15%, 96.15%, and 96.15%, correspondingly.
Conclusion
In this study, a novel CREA-HDLMOA methodology is proposed. The primary objective of the CREA-HDLMOA methodology is to advance an effective method for DDoS attack detection using advanced optimization algorithms. Initially, the data normalization stage employs LSN to convert input data into a beneficial format. Besides, the ROA implements the FS process for selecting the most relevant features from the data. In addition, the hybrid of the LSTM + BiGRU technique is deployed for the DDoS attack classification process. At last, the MPOA-based hyperparameter selection process is performed to optimize the classification results of the LSTM + BiGRU technique. An extensive simulation is performed to validate the performance of the CREA-HDLMOA method under CIC-IDS2017 and Edge-IIoT datasets. The experimental validation of the CREA-HDLMOA method portrayed a superior accuracy value of 99.31% and 99.36% under dual datasets over existing approaches. The limitations of the CREA-HDLMOA method comprise restricted adaptability to dynamic network environments, where growing attack patterns may reduce detection accuracy over time. The model may be affected by high-speed traffic conditions due to computational overhead. Furthermore, real-time deployment on low-resource devices poses latency and scalability challenges. Although comprehensive, the dataset may not fully represent real-world traffic diversity. Label imbalance in the dataset can also affect classification fairness. Future studies may explore lightweight architectures appropriate for edge deployment, integrate adaptive learning mechanisms to cope with evolving threats, and utilize ensemble methods for improved generalization across varied attack types and network settings.
Data availability
The data that support this study’s findings are openly available in the Kaggle repository at https://www.kaggle.com/datasets/chethuhn/network-intrusion-dataset and https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot, reference numbers34,35.
References
Al-Shareeda, M. A., Manickam, S. & Saare, M. A. DDoS attacks detection using machine learning and deep learning techniques: analysis and comparison. Bull. Electr. Eng. Inf. 12 (2), 930–939 (2023).
Banitalebi Dehkordi, A., Soltanaghaei, M. & Boroujeni, F. Z. The DDoS attacks detection through machine learning and statistical methods in SDN. J. Supercomput. 77 (3), 2383–2415 (2021).
Alghamdi, M. I. An investigation into the effect of cybersecurity on attack prevention strategies. J. Cybersecur. Inform. Manage. 3 (2), 53–60 (2020).
Saghezchi, F. B., Mantas, G., Violas, M. A., de Oliveira Duarte, A. M. & Rodriguez, J. Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics. 11(4), 602. (2022).
Syed, N. F., Baig, Z., Ibrahim, A. & Valli, C. Denial of service attack detection through machine learning for the IoT. J. Inform. Telecommun. 4 (4), 482–503 (2020).
Khempetch, T. & Wuttidittachotti, P. DDoS attack detection using deep learning. IAES Int. J. Artif. Intell. 10(2), 382 (2021).
Shurman, M., Khrais, R. & Yateem, A. DoS and DDoS attack detection using deep learning and IDS. Int. Arab. J. Inf. Technol. 17 (4A), 655–661 (2020).
Aamir, M. & Zaidi, S. M. A. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. Int. J. Inf. Secur. 18, 761–785 (2019).
Sambangi, S. & Gondi, L. December. A machine learning approach for DDoS (distributed denial of service) attack detection using multiple linear regression. Proceedings 63(1), 51 (2020). MDPI
Zaboon, K. H. & Abdullah, A. A. A review of the common DDoS attack: types and protection approaches based on artificial intelligence. Rev. Article. 7 (1), 08–08 (2021).
Chawla, M. & Bhardwaj, A. January. Efficient virtualization resource utilization technique for cybersecurity attacks. In AIP Conference Proceedings (Vol. 3253, No. 1). AIP Publishing. (2025).
Mahmood, A. M. & Avcı, İ. Cybersecurity defence mechanism against DDoS attack with explainability. Mesopotamian J. Cybersecur. 4 (3), 278–290 (2024).
Ali, M., Saleem, Y., Hina, S. & Shah, G. A. DDoSViT: IoT DDoS attack detection for fortifying firmware Over-The-Air (OTA) updates using vision transformer. Internet Things 30, 101527 (2025).
Xing, F., Tong, F., Yang, J., Cheng, G. & He, S. RAM: A Resource-Aware DDoS Attack Mitigation Framework in Clouds. IEEE Trans. Cloud Comput. (2024).
Yadav, A., Kaur, M., Sharma, C. & Prashar, D. Next-gen distributed denial-of-service detection and mitigation in software-defined networking using hybrid machine learning approach. In Soft Computing in Smart Manufacturing and Materials (97–133). Elsevier. https://doi.org/10.1016/B978-0-443-29927-8.00005-9 (2025).
Aguru, A. D. & Erukala, S. B. A lightweight multi-vector DDoS detection framework for IoT-enabled mobile health informatics systems using deep learning. Inf. Sci. 662, 120209 (2024).
Mohammed, B. H. et al. Anomaly detection of distributed denial of service (DDoS) in IoT network using machine learning. In Digital Technologies and Transformation in Business, Industry and Organizations: Volume 3 (41–64). Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-78412-5_3(2025).
Patil, V. T. & Shivaji, S. IoT-Guardian: advanced detection of DDoS attacks in IoT systems using CNNs. J. Electr. Syst. 20 (10s), 3855–3864 (2024).
Sumathi, S. & Rajesh, R. HybGBS: a hybrid neural network and grey Wolf optimizer for intrusion detection in a cloud computing environment. Concurr. Comput.: Pract. Exp. 36 (24), e8264 (2024).
Panja, S. et al. An efficient malware detection approach based on machine learning feature influence techniques for resource-constrained devices. IEEE Access. (2025).
Sokkalingam, S. & Ramakrishnan, R. An intelligent intrusion detection system for distributed denial of service attacks: a support vector machine with hybrid optimization algorithm based approach. Concurr. Comput.: Pract. Exp. 34 (27), e7334 (2022).
Sumathi, S., Rajesh, R. & Lim, S. Recurrent and deep learning neural network models for DDoS attack detection. J. Sens. 2022 (1), 8530312 (2022).
Berguiga, A., Harchay, A. & Massaoudi, A. HIDS-RPL: A hybrid deep Learning-Based intrusion detection system for RPL in internet of medical thing networks. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3545918TY (2025).
Sumathi, S. & Rajesh, R. A dynamic BPN-MLP neural network DDoS detection model using hybrid swarm intelligent framework. Indian J. Sci. Technol. 16 (43), 3890–3904 (2023).
Sumathi, S. & Rajesh, R. Comparative study on TCP SYN flood DDoS attack detection: a machine learning algorithm based approach. WSEAS Trans. Syst. Control. 16, 584–591 (2021).
Zachos, G., Mantas, G., Porfyrakis, K., Bastos, J. M. C. & Rodriguez, J. Anomaly-Based intrusion detection for IoMT networks: design, implementation, dataset generation and ML algorithms evaluation. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3547572TY (2025).
Panja, S., Yadav, K. & Nag, A. Anomaly detection at the iot edge in iot-based smart home environment using deep learning. In Proceedings of International Conference on Advanced Computing Applications: ICACA 2021 (pp. 119–125). Springer Singapore. (2022).
Hota, A., Panja, S. & Nag, A. Lightweight CNN-based malware image classification for resource-constrained applications. Innov. Syst. Softw. Eng., 21, 1–14 (2025).
Chinnasamy, R., Subramanian, M. & Sengupta, N. Empowering intrusion detection systems: a synergistic hybrid approach with optimization and deep learning techniques for network security. Int. Arab. J. Inform. Technol. (IAJIT), 22(1), 60–76 (2025).
Panja, S., Patowary, N., Saha, S. & Nag, A. February. Anomaly detection in iot using extended isolation forest. In International Symposium on Artificial Intelligence (pp. 3–14). Cham: Springer Nature Switzerland. (2022).
Ma, Z. & Zhang, Y. A study on rolling bearing fault diagnosis using RIME-VMD. Sci. Rep. 15 (1), 1–14 (2025).
Selim, M. M. & Assiri, M. S. Enhancing Arabic text-to-speech synthesis for emotional expression in visually impaired individuals using the artificial hummingbird and hybrid deep learning model. Alexandria Eng. J. 119, 493–502 (2025).
Koyalil, A., Rajalingam, S. & Multi-Level, E. K-means clustering and cluster head selection using a modernized pufferfish optimization algorithm for lifetime maximization in wireless sensor networks. Available at SSRN 5126771.
https://www.kaggle.com/datasets/chethuhn/network-intrusion-dataset
https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot
Ho, S., Al Jufout, S., Dajani, K. & Mozumdar, M. A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network. IEEE Open J. Comput. Soc. 2, 14–25. (2021).
Zhong, Z., Xie, C. & Tang, X. Intrusion traffic detection and classification based on unsupervised learning. IEEE Access. https://doi.org/10.1109/ACCESS.2024.3400213TY (2024).
Olawale, O. P. & Ebadinezhad, S. Cybersecurity anomaly detection: Ai and Ethereum blockchain for a secure and tamperproof Ioht data management. IEEE Access. https://doi.org/10.1109/ACCESS.2024.3460428TY (2024).
Zhukabayeva, T., Zholshiyeva, L., Karabayev, N., Khan, S. & Alnazzawi, N. Cybersecurity solutions for industrial internet of things–edge computing integration: challenges, threats, and future directions. Sensors. 25(1), 213 (2025).
Acknowledgements
Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2025R384), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Author information
Authors and Affiliations
Contributions
S Jayanthi: Conceptualization, methodology development, experiment, formal analysis, investigation, writing. Swathi Sowmya Bavirthi: Formal analysis, investigation, validation, visualization, writing. P. Murali: Formal analysis, review and editing. K Vijaya Kumar: Methodology, investigation. Mohamad Khairi Ishak: Review and editing.Samih M. Mostafa: Discussion, review and editing. Hend Khalid Alkahtani: Conceptualization, methodology development, investigation, supervision, review and editing.All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Ethics approval
This article contains no studies with human participants performed by any authors.
Consent to participate
Not applicable.
Informed consent
Not applicable.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Jayanthi, S., Bavirthi, S.S., Murali, P. et al. Advancements in cyberthreat intelligence through resource exhaustion attack detection using hybrid deep learning with heuristic search algorithms. Sci Rep 15, 30461 (2025). https://doi.org/10.1038/s41598-025-13305-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-025-13305-8