ditionally, using this as an SIEM system component
designed for detecting DDoS attacks in a real-life sys-
tem, and evaluating its performance together with the
experts could be future research directions. This way,
we could evaluate how such systems reduce network
security costs and benefit to incident response teams.
REFERENCES
Avazpour, I., Pitakrat, T., Grunske, L., and Grundy, J.
(2014). Dimensions and Metrics for Evaluating Rec-
ommendation Systems. In Robillard, M. P., Maalej,
W., Walker, R. J., and Zimmermann, T., editors, Rec-
ommendation Systems in Software Engineering, pages
245–273. Springer Berlin Heidelberg, Berlin, Heidel-
berg.
Belavagi, M. C. and Muniyal, B. (2016). Performance Eval-
uation of Supervised Machine Learning Algorithms
for Intrusion Detection. Procedia Computer Science,
89:117–123.
Boonchai, J., Kitchat, K., and Nonsiri, S. (2022). The
Classification of DDoS Attacks Using Deep Learn-
ing Techniques. In 2022 7th International Conference
on Business and Industrial Research (ICBIR), pages
544–550.
Catillo, M., Pecchia, A., and Villano, U. (2022). AutoLog:
Anomaly detection by deep autoencoding of system
logs. Expert Systems with Applications, 191:116263.
Chan, A., Ng, W., Yeung, D., and Tsang, C. (2004).
Refinement of rule-based intrusion detection system
for denial of service attacks by support vector ma-
chine. In Proceedings of 2004 International Con-
ference on Machine Learning and Cybernetics (IEEE
Cat. No.04EX826), pages 4252–4256.
Cil, A. E., Yildiz, K., and Buldu, A. (2021). Detection
of ddos attacks with feed forward based deep neural
network model. Expert Systems with Applications,
169:114520.
Cinque, M., Cotroneo, D., and Pecchia, A. (2018). Chal-
lenges and Directions in Security Information and
Event Management (SIEM). In 2018 IEEE Interna-
tional Symposium on Software Reliability Engineering
Workshops (ISSREW), pages 95–99.
Gaur, V. and Kumar, R. (2022). DDoSLSTM: Detection of
Distributed Denial of Service Attacks on IoT Devices
using LSTM Model. In 2022 International Confer-
ence on Communication, Computing and Internet of
Things (IC3IoT), pages 01–07.
Halladay, J., Cullen, D., Briner, N., Warren, J., Fye, K., Bas-
net, R., Bergen, J., and Doleck, T. (2022). Detection
and Characterization of DDoS Attacks Using Time-
Based Features. IEEE Access, pages 49794–49807.
LeCun, Y., Bengio, Y., and Hinton, G. (2015). Deep learn-
ing. Nature, pages 436–444.
Li, Y. and Lu, Y. (2019). LSTM-BA: DDoS Detection Ap-
proach Combining LSTM and Bayes. In 2019 Seventh
International Conference on Advanced Cloud and Big
Data (CBD), pages 180–185.
Liu, H. and Lang, B. (2019). Machine learning and deep
learning methods for intrusion detection systems: A
survey. Applied Sciences, 9(20).
Masdari, M. and Jalali, M. (2016). A survey and taxon-
omy of DoS attacks in cloud computing. Security and
Communication Networks, pages 3724–3751.
Moustafa, N. and Slay, J. (2015). UNSW-NB15: a compre-
hensive data set for network intrusion detection sys-
tems (UNSW-NB15 network data set). In 2015 Mil-
itary Communications and Information Systems Con-
ference (MilCIS), pages 1–6.
Ozgun, K. (2023). A Recommender System to Detect
Distributed Denial of Service Attacks with Network
and Transport Layer Features. https://github.com/
kaganozgun/dos-prediction-with-lstm.
Ramzy Shaaban, A., Abdelwaness, E., and Hussein, M.
(2019). TCP and HTTP Flood DDOS Attack Analy-
sis and Detection for space ground Network. In 2019
IEEE International Conference on Vehicular Elec-
tronics and Safety (ICVES), pages 1–6.
Rezaimehr, F. and Dadkhah, C. (2021). A survey of attack
detection approaches in collaborative filtering recom-
mender systems. Artif Intell Rev, pages 2011–2066.
Sanjar, K., Rehman, A., Paul, A., and JeongHong, K.
(2020). Weight Dropout for Preventing Neural Net-
works from Overfitting. In 2020 8th International
Conference on Orange Technology (ICOT), pages 1–
4.
Sharafaldin, I., Lashkari, A. H., Hakak, S., and Ghorbani,
A. A. (2019). Developing Realistic Distributed Denial
of Service (DDoS) Attack Dataset and Taxonomy. In
IEEE 53rd International Carnahan Conference on Se-
curity Technology, pages 1–6.
Siami-Namini, S., Tavakoli, N., and Namin, A. S. (2019).
The Performance of LSTM and BiLSTM in Forecast-
ing Time Series. In 2019 IEEE International Confer-
ence on Big Data (Big Data), pages 3285–3292.
Stiawan, D., Suryani, M. E., Susanto, Idris, M. Y., Al-
dalaien, M. N., Alsharif, N., and Budiarto, R. (2021).
Ping Flood Attack Pattern Recognition Using a K-
Means Algorithm in an Internet of Things (IoT) Net-
work. IEEE Access, pages 116475–116484.
Van Houdt, G., Mosquera, C., and N
´
apoles, G. (2020). A
review on the long short-term memory model. Artifi-
cial Intelligence Review, 53(8):5929–5955.
Vishwakarma, R. and Jain, A. K. (2020). A survey of DDoS
attacking techniques and defence mechanisms in the
IoT network. Telecommunication Systems, 73(1):3–
25.
Wu, Z., Zhang, H., Wang, P., and Sun, Z. (2022). RTIDS:
A Robust Transformer-Based Approach for Intrusion
Detection System. IEEE Access, pages 64375–64387.
Zou, L., Wei, Y., Ma, L., and Leng, S. (2022). Feature-
Attended Multi-Flow LSTM for Anomaly Detection
in Internet of Things. In IEEE INFOCOM 2022
- IEEE Conference on Computer Communications
Workshops (INFOCOM WKSHPS), pages 1–6.
A Recommender System to Detect Distributed Denial of Service Attacks with Network and Transport Layer Features
397