DDoS Detection Using a Hybrid CNN–RNN Model Enhanced with Multi-Head Attention for Cloud Infrastructure
Abstract
1. Introduction
- This study investigates multiple TCP-based DDoS attack types and systematically analyzes each feature using statistical methods. By calculating the information gained, we can accurately identify the factors that significantly impact network traffic behavior under DDoS conditions in cloud systems.
- We propose a novel anomaly detection method that is specifically designed to identify cloud-based DDoS attacks. This method employs a hybrid learning architecture that effectively combines a convolutional neural network (CNN) and bidirectional long short-term memory (BiLSTM), further enhanced with multi-head attention to capture temporal and spatial features.
- We utilize preprocessing techniques, such as normalization and SMOTE, which are intelligently integrated with dynamic feature selection. These processes help to mitigate the class imbalance problem in the BCCC-cPacket-Cloud-DDoS-2024 dataset. In addition, we applied information gain to statistically evaluate the influence of each feature. This process significantly improved the recall of minority classes and strengthened the overall robustness of the model.
- We demonstrate that our proposed hybrid deep learning approach consistently achieves a high detection accuracy and recall on the BCCC-cPacket-Cloud-DDoS-2024 dataset. The model was trained on 50 selected features across 519,614 records to effectively distinguish between benign, suspicious, and multiple DDoS traffic types.
- Our model was designed with a lightweight architecture consisting of 413,057 parameters, which is suitable for application in a cloud infrastructure environment.
2. Related Work
3. Methods and Tools Used in Experiment
3.1. Experiment Workflow
3.2. Dataset
3.3. Data Preprocessing
3.3.1. Data Cleansing and Labeling
3.3.2. Feature Selection
3.3.3. Normalization
3.3.4. SMOTE
4. The Proposed Network Intrusion Detection Model
4.1. Convolution Neural Network
4.2. Recurrent Neural Network
4.3. Multi-Head Attention Mechanism
4.4. Hybrid Deep Learning Model
5. Experiment and Result
5.1. Experiment Setup
5.2. Model Evaluation
- True Positive (TP): The number of instances where the system correctly detects an attack, and the data is indeed attack traffic.
- False Positive (FP): The number of instances where the system predicted an attack, but actually benign traffic.
- True Negative (TN): The number of instances where the system correctly predicted as benign and proved to be benign traffic.
- False Negative (FN): The number of instances where the system was predicted to be benign but was attack traffic.
5.3. Results and Discussion
5.3.1. Compared with Other Deep Learning Architectures and Hybrid Models
5.3.2. Inference Performance on Different Cloud Hardware Instances
5.3.3. Compared with State-of-the-Art DDoS Detection
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- StormWall. DDoS Attack Report 2024. StormWall Blog. 2024. Available online: https://stormwall.network/resources/blog/ddos-attack-statistics-2024 (accessed on 20 August 2025).
- Sharafaldin, I.; Lashkari, A.H.; Hakak, S.; Ghorbani, A.A. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. In Proceedings of the International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019. [Google Scholar]
- Shafi, M.; Lashkari, A.H.; Rodriguez, V.; Nevo, R. Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization. Information 2024, 15, 195. [Google Scholar] [CrossRef]
- Fathima, A.; Devi, G.S.; Faizaanuddin, M. Improving Distributed Denial of Service Attack Detection Using Supervised Machine Learning. Meas. Sens. 2023, 30, 100911. [Google Scholar] [CrossRef]
- Liu, C.; Zhong, S. DDoS Attack Detection Method Based on Machine Learning. In Proceedings of the 15th International Conference on Software Engineering and Service Science, Changsha, China, 13–14 September 2024. [Google Scholar]
- Naiem, S.; Khedr, A.E.; Idrees, A.M.; Marie, M.I. Enhancing the Efficiency of Gaussian Naïve Bayes Machine Learning Classifier in the Detection of DDoS in Cloud Computing. IEEE Access 2023, 11, 124597–124608. [Google Scholar] [CrossRef]
- Ismail; Mohand, I.M.; Hussain, H.; Khan, A.A.; Ullah, U.; Zakarya, M. A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks. IEEE Access 2022, 10, 21443–21454. [Google Scholar] [CrossRef]
- Zhao, J.; Liu, Y.; Zhang, Q.; Zheng, X. CNN-AttBiLSTM mechanism: A DDoS attack detection method based on attention mechanism and CNN-BiLSTM. IEEE Access 2022, 11, 136308–136317. [Google Scholar] [CrossRef]
- Najar, A.A.; Naik, S.M. DDoS attack detection using CNN-BiLSTM with attention mechanism. Telemat. Inform. Rep. 2025, 18, 100211. [Google Scholar] [CrossRef]
- Cil, A.E.; Yildiz, K.; Buldu, A. Detection of DDoS attacks with feed forward based deep neural network model. Expert Syst. Appl. 2021, 169, 114520. [Google Scholar] [CrossRef]
- Hsu, C.M.; Azhari, M.Z.; Hsieh, H.Y.; Prakosa, S.W.; Leu, J.S. Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks. Mob. Netw. Appl. 2021, 26, 1137–1144. [Google Scholar] [CrossRef]
- Abusitta, A.; Bellaiche, M.; Dagenais, M.; Halabi, T. A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Gener. Comput. Syst. 2019, 98, 308–318. [Google Scholar] [CrossRef]
- Abdelaty, M.; Hayward, S.S.; Doriguzzi-Corin, R.; Siracusa, D. GADoT: GAN-based adversarial training for robust DDoS attack detection. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Virtual, 4–6 October 2021; pp. 119–127. [Google Scholar]
- Najar, A.A.; Naik, M. A Robust DDoS Intrusion Detection System Using Convolutional Neural Network. Comput. Electr. Eng. 2024, 117, 109277. [Google Scholar] [CrossRef]
- Hnamte, V.; Hussain, J. DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System. Telemat. Inform. Rep. 2023, 10, 100053. [Google Scholar] [CrossRef]
- Yaser, A.L.; Mousa, H.M.; Hussein, M. Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder. Future Internet. 2022, 14, 240. [Google Scholar] [CrossRef]
- Aydına, H.; Ormanb, Z.; Aydın, M.A. A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. Comput. Secur. 2022, 118, 102725. [Google Scholar] [CrossRef]
- Cheng, J.; Liu, Y.; Tang, X.; Sheng, V.S.; Li, M.; Li, J. DDoS Attack Detection via Multi-scale Convolutional Neural Network. Comput. Mater. Contin. 2020, 62, 1317–1333. [Google Scholar] [CrossRef]
- Jihado, A.A.; Girsang, A.S. Hybrid Deep Learning Network Intrusion Detection System Based on Convolutional Neural Network and Bidirectional Long Short-Term Memory. J. Adv. Inf. Technol. 2024, 15, 219–232. [Google Scholar] [CrossRef]
- Kirubavathi, G.; Sumathi, I.R.; Mahalakshmi, J.; Srivastava, D. Detection and mitigation of TCP based DDoS attacks in cloud environments using a self-attention and intersample attention transformer model. J. Supercomput. 2025, 81, 474. [Google Scholar] [CrossRef]
- Akgun, D.; Hizal, S.; Cavusoglu, U. A new DDoS attacks intrusion detection model based on deep learning for cybersecurity. Comput. Secur. 2022, 118, 102748. [Google Scholar] [CrossRef]
- Le, T.T.H.; Heo, S.; Cho, J.; Kim, H. DDoSBERT: Fine-tuning variant text classification bidirectional encoder representations from transformers for DDoS detection. Comput. Netw. 2025, 262, 111150. [Google Scholar] [CrossRef]
- Ahmim, A.; Maazouzi, F.; Ahmim, M.; Namane, S.; Dhaou, I.B. Distributed Denial of Service Attack Detection for the Internet of Things Using Hybrid Deep Learning Model. IEEE Access 2023, 11, 119862–119875. [Google Scholar] [CrossRef]
- Said, R.B.; Sabir, Z.; Askerzade, I. CNN-BiLSTM: A Hybrid Deep Learning Approach for Network Intrusion Detection System in Software-Defined Networking with Hybrid Feature Selection. IEEE Access 2023, 11, 138732–138747. [Google Scholar] [CrossRef]
- Elubeyd, H.; Kaplan, D.Y. Hybrid Deep Learning Approach for Automatic DoS/DDoS Attacks Detection in Software-Defined Networks. Appl. Sci. 2023, 13, 3828. [Google Scholar] [CrossRef]
- Batchu, R.K.; Seetha, H. A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning. Comput. Netw. 2021, 200, 108498. [Google Scholar] [CrossRef]
- Alhayan, F.; Kashif Saeed, M.; Allafi, R.; Abdullah, M.; Subahi, A.; Alghanmi, N.A.; Alkhudhayr, H. Hybrid deep learning models with spotted hyena optimization for cloud computing enabled intrusion detection system. J. Radiat. Res. 2025, 18, 101523. [Google Scholar] [CrossRef]
- Xiao, T.; Xing, C.; Zhang, T.; Zhao, Z. An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks. IEEE Access 2019, 7, 42210–42219. [Google Scholar] [CrossRef]
- Sogüt, E.; Erdem, O.A. Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems. Appl. Sci. 2023, 13, 5993. [Google Scholar] [CrossRef]
- Varalakshmi, I.; Thenmozhi, M. Entropy based earlier detection and mitigation of DDoS attack using stochastic method in SDN_IOT. Meas. Sens. 2025, 39, 101873. [Google Scholar] [CrossRef]
- Assis, M.V.O.D.; Carvalho, L.F.; Rodigues, J.J.P.C.; Lloret, J.; Proença, M.L., Jr. Near real-time security system applied to SDN environments in IoT networks using convolutional neural network. Comput. Electr. Eng. 2020, 86, 106783. [Google Scholar] [CrossRef]
- Elaziz, M.A.; Al-qaness, M.A.A.; Dahou, A.; Ibrahim, R.A.; El-Latif, A.A.A. Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm. Adv. Eng. Softw. 2023, 176, 103402. [Google Scholar] [CrossRef]
- Patro, S.G.K.; Sahu, K.K. Normalization: A Preprocessing Stage. Int. Adv. Res. J. Sci. Eng. Technol. 2015, 2, 20–22. [Google Scholar] [CrossRef]
- Chawla, N.V.; Bowyer, K.W.; Hall, L.O.; Kegelmeyer, W.P. SMOTE: Synthetic Minority Over-sampling Technique. J. Artif. Intell. Res. 2002, 16, 321–357. [Google Scholar] [CrossRef]
- O’Shea, K.; Nash, R. An Introduction to Convolutional Neural Networks. arXiv 2015, arXiv:1511.08458. Available online: https://arxiv.org/abs/1511.08458 (accessed on 20 August 2025). [CrossRef]
- Hochreiter, S.; Schmidhuber, J. Long Short-Term Memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef]
- Cho, K.; van Merrienboer, B.; Bahdanau, D.; Bengio, Y. On the Properties of Neural Machine Translation: Encoder-Decoder Approaches. arXiv 2014, arXiv:1409.1259. Available online: https://arxiv.org/abs/1409.1259 (accessed on 20 August 2025). [CrossRef]
- Cordonnier, J.B.; Martin, A.L. Multi-Head Attention: Collaborate Instead of Concatenate. In Proceedings of the International Conference on Learning Representations (ICLR), Vienna, Austria, 4 May 2021; Available online: https://arxiv.org/abs/2006.16362 (accessed on 20 August 2025).
- Mienye, I.D.; Swart, T.G. A Comprehensive Review of Deep Learning: Architectures, Recent Advances, and Applications, Information. Information 2024, 15, 755. [Google Scholar] [CrossRef]
- Xie, Y.; Wang, J.; Li, H.; Dong, A.; Kang, Y.; Zhu, J.; Wang, Y.; Yang, Y. Deep Learning CNN-GRU Method for GNSS Deformation Monitoring Prediction. Appl. Sci. 2024, 14, 4004. [Google Scholar] [CrossRef]










| Reference | Technique | Datasets | Advantage | Limitations |
|---|---|---|---|---|
| [3] (2024) | Constructed a cloud testbed and developed a novel dataset. | BCCC-cPacket-Cloud-DDoS-2024 | Provides a realistic representation of cloud network traffic and enables reproducible evaluation of DDoS detection methods | Dataset does not cover other network types, such as IoT and wireless sensor network. |
| [9] (2025) | CNN and BiLSTM networks with an attention mechanism | CIC-DDOS2019 and Edge-Industrial IoT (IIoT) | Classification CICDDOS accuracies of 99.78% and Edge-IIoT 98.84%. | The model generalizes well across the tested datasets, its robustness against unseen or evolving attack. |
| [20] (2025) | Self-Attention and Inter-sample Attention Transformer (SAINT) model, a unique deep learning architecture | CIC-DDOS2019 and BCCC-cPacket-Cloud-DDoS-2024 | Enables high performance detection, achieving: 95% precision 95% recall 96% F1-score 97% accuracy on the BCCC-cPacket-Cloud-DDoS-2024 dataset. | Challenges in adapting to diverse cloud environments and evolving attack vectors. |
| [21] (2022) | Inception architecture with deep neural network, CNN, and LSTM. | CIC-DDoS2019 | High accuracy on binary classification 99.9% and multiclass with 99.3%. | High computational cost and latency in real time monitoring systems. |
| [22] (2025) | Implement bidirectional encoder representations from transformers to perform DDoS classification | CIC-DDoS2019, CRCDDoS2022 and BCCC- cPacket-Cloud-DDoS- 2024 | High accuracy of approximately 0.9944, with precision, recall, and F1-score evaluated on a combination of multiple benchmark DDoS datasets. | A limited amount of training data constrains the model’s ability to capture complex behavioral patterns of DDoS attacks. |
| [24] (2023) | CNN + BiLSTM hybrid model, hybrid feature selection | UNSW-NB15 | Achieves high accuracy with faster training performance. | Redundant and imbalanced data, computational demands, dataset specific generalizability. |
| No. | Feature | Information Gain | No. | Feature | Information Gain |
|---|---|---|---|---|---|
| 1 | Maximum of packet inter-arrival time | 0.468413 | 26 | Forward total header bytes | 0.316555 |
| 2 | Mean of packet inter-arrival time | 0.468288 | 27 | Packets rate | 0.151600 |
| 3 | Total of packet inter-arrival time | 0.467820 | 28 | Median of packets delta time | 0.149144 |
| 4 | Minimum of packet inter-arrival time | 0.467236 | 29 | Mode of packets delta time | 0.149087 |
| 5 | Median of packet inter-arrival time | 0.467079 | 30 | Duration | 0.148428 |
| 6 | Mode of packet inter-arrival time | 0.466816 | 31 | Synchronize flag percentage in total | 0.147620 |
| 7 | Total of forward packet inter-arrival time | 0.464215 | 32 | Mean of packets delta time | 0.147511 |
| 8 | Minimum of forward packet inter-arrival time | 0.463940 | 33 | Forward synchronize flag percentage in total | 0.145144 |
| 9 | Mean of forward packet inter-arrival time | 0.463701 | 34 | Reset flag counts | 0.134442 |
| 10 | Maximum of forward packet inter-arrival time | 0.463657 | 35 | Forward packets rate | 0.122604 |
| 11 | Median of forward packet inter-arrival time | 0.463451 | 36 | Forward synchronize flag counts | 0.116417 |
| 12 | Mode of forward packet inter-arrival time | 0.463221 | 37 | Synchronize flag counts | 0.110731 |
| 13 | Forward initial window bytes | 0.446449 | 38 | Mean of packets delta length | 0.108264 |
| 14 | Mean of header bytes | 0.426078 | 39 | Reset flag percentage in total | 0.106789 |
| 15 | Minimum of header bytes | 0.423850 | 40 | Median of packets delta length | 0.105466 |
| 16 | Median of header bytes | 0.413901 | 41 | Backward packets rate | 0.105094 |
| 17 | Mean of forward header bytes | 0.413310 | 42 | Total of backward packet inter-arrival time | 0.103053 |
| 18 | Mode of header bytes | 0.413125 | 43 | Mean of backward packet inter-arrival time | 0.102736 |
| 19 | Minimum of forward header bytes | 0.412047 | 44 | Maximum of backward packet inter-arrival time | 0.101727 |
| 20 | Median of forward header bytes | 0.411624 | 45 | Median of backward packet inter-arrival time | 0.101716 |
| 21 | Mode of forward header bytes | 0.411536 | 46 | Acknowledge flag percentage in total | 0.101178 |
| 22 | Maximum of forward header bytes | 0.410773 | 47 | Minimum of backward packet inter-arrival time | 0.100989 |
| 23 | Maximum of header bytes | 0.409208 | 48 | Backward total header bytes | 0.100937 |
| 24 | Source port | 0.361840 | 49 | Minimum of packets delta length | 0.100885 |
| 25 | Total of header bytes | 0.320193 | 50 | Mode of backward packet inter-arrival time | 0.100852 |
| Phase | Features Number | Class | Record |
|---|---|---|---|
| Original | 324 | Normal | 413,199 |
| Attack | 228,469 | ||
| Total | 641,668 | ||
| After preprocessing method | 50 | Normal | 349,178 |
| Attack | 170,436 | ||
| Total | 519,614 |
| Layer | Input Shape | Output Shape |
|---|---|---|
| Input layer | (batch, 50, 1) | (batch, 50, 1) |
| Conv1D | (batch, 50, 1) | (batch, 46, 128) |
| Max pooling1D | (batch, 46, 128) | (batch, 23, 128) |
| BiLSTM | (batch, 23, 128) | (batch, 23, 256) |
| Multi-head attention | (batch, 23, 256) | (batch, 23, 256) |
| Layer normalization | (batch, 23, 256) | (batch, 23, 256) |
| Global average pooling1D | (batch, 23, 256) | (batch, 256) |
| Fully connected layer | (batch, 256) | (batch, 64) |
| Output Layer | (batch, 64) | (batch, 1) |
| Library | Version |
|---|---|
| Tensorflow | 2.19.0 |
| Keras | 3.10.0 |
| Scikit-learn | 1.6.1 |
| Numpy | 2.0.2 |
| Pandas | 2.2.2 |
| Matplotlib | 3.10.0 |
| Seaborn | 0.13.2 |
| Psutil | 5.9.5 |
| Hyper Parameter | Value |
|---|---|
| CNN Activation Function | ReLu |
| Optimization Function | Adam |
| Learning rate | 0.0005 |
| Early stopping patience | 10 |
| Learning rate scheduling patience | 5 |
| Number of CNN Layer | 128 |
| CNN kernel filter size | 5 |
| Padding | Valid |
| Stride | 1 |
| Number of BiLSTM Layer | 128 |
| Batch Size | 64 |
| Loss function | Binary cross entropy |
| Epoch | 100 |
| Number of attention heads | 4 |
| Dimensionality of the key vectors per head | 32 |
| Deep Learning Method | Parameters | Accuracy (%) | Precision (%) | Recall (%) | F1-Score (%) |
|---|---|---|---|---|---|
| CNN | 20,933 | 96.28 | 98.59 | 89.93 | 94.06 |
| CNN + GRU | 117,249 | 97.42 | 98.83 | 93.24 | 95.95 |
| CNN + BiGRU | 232,961 | 97.56 | 98.81 | 93.68 | 96.18 |
| CNN + LSTM | 141,313 | 97.64 | 98.59 | 94.16 | 96.32 |
| CNN + BiLSTM | 281,345 | 97.67 | 98.51 | 94.31 | 96.37 |
| CNN + LSTM + multi-head attention | 273,025 | 97.70 | 98.58 | 94.35 | 96.42 |
| CNN + BiLSTM + multi-head attention (Our Proposed) | 413,057 | 97.78 | 98.66 | 94.53 | 96.49 |
| Deep Learning Method | CPU RAM (GB) | GPU Memory (GB) | Stopping Epoch | Time Per Epoch (Seconds) | Average Inference Time (Milliseconds) |
|---|---|---|---|---|---|
| CNN | 12.86 | 4.22 | 80 | 13.6 | 0.04 |
| CNN + GRU | 10.12 | 1.22 | 100 | 75 | 0.135 |
| CNN + BiGRU | 12.89 | 4.22 | 100 | 106 | 0.2 |
| CNN + LSTM | 12.29 | 4.22 | 100 | 73 | 0.121 |
| CNN + BiLSTM | 13.71 | 4.22 | 100 | 105 | 0.181 |
| CNN + LSTM + multi-head attention | 11.54 | 2.22 | 87 | 86 | 0.13 |
| CNN + BiLSTM + multi-head attention (Our Proposed) | 10.53 | 2.22 | 93 | 119 | 0.194 |
| Deep Learning Method | True Positive | False Negative | True Negative | False Positive |
|---|---|---|---|---|
| CNN | 30,656 | 3431 | 69,396 | 440 |
| CNN + GRU | 31,784 | 2303 | 69,459 | 377 |
| CNN + BiGRU | 31,932 | 2155 | 69,452 | 384 |
| CNN + LSTM | 32,096 | 1991 | 69,376 | 460 |
| CNN + BiLSTM | 32,149 | 1938 | 69,351 | 485 |
| CNN + LSTM+ multi-head attention | 32,162 | 1925 | 69,373 | 463 |
| CNN + BiLSTM+ multi-head attention (Our Proposed) | 32,221 | 1866 | 69,399 | 437 |
| Instance Type | CPU Model | RAM (GB) | CPU Usage (%) | Average Inference Time (Milliseconds) |
|---|---|---|---|---|
| t2.micro | Intel Xeon Family | 2 | 69.15 | 5.19 |
| t2.medium | Intel Xeon Family | 4 | 68.92 | 4.07 |
| t2.large | Intel Xeon Family | 8 | 68.64 | 3.98 |
| t2.xlarge | Intel Xeon Family | 16 | 46.45 | 3.25 |
| Reference | Method | Datasets | Accuracy (%) | Precision (%) | Recall (%) | F1-Score (%) | Parameters |
|---|---|---|---|---|---|---|---|
| [3] (2024) | Feature Selection and Machine Learning Algorithm | BCCC-cPacket-Cloud-DDoS-2024 | - | 94 | 94 | 94 | - |
| [9] (2025) | CNN + BiLSTM and Attention Mechanism | CIC-DDoS2019 | 99.78 | 98.7 | 99.77 | 99.44 | ~6 M |
| [19] (2024) | PCA with CNN-BiLSTM | CIC-IDS2017 | 99.83 | 99.91 | 99.87 | 99.89 | ~50 K |
| [20] (2025) | Self-Attention and Inter-sample Attention Transformer | BCCC-cPacket-Cloud-DDoS-2024 | 97 | 95 | 95 | 96 | ~100 K |
| [22] (2025) | DDoS-Bidirectional Encoder Representations from Transformers (DDoS-BERT) | BCCC-cPacket-Cloud-DDoS-2024 | 98.98 | 98.95 | 99.67 | 99.31 | ~67 M |
| Our Model | CNN + BiLSTM + Multi-Head Attention | BCCC-cPacket-Cloud-DDoS-2024 | 97.79 | 98.79 | 94.43 | 96.56 | ~400 K |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sathaporn, P.; Krungseanmuang, W.; Chaowalittawin, V.; Benjangkaprasert, C.; Purahong, B. DDoS Detection Using a Hybrid CNN–RNN Model Enhanced with Multi-Head Attention for Cloud Infrastructure. Appl. Sci. 2025, 15, 11567. https://doi.org/10.3390/app152111567
Sathaporn P, Krungseanmuang W, Chaowalittawin V, Benjangkaprasert C, Purahong B. DDoS Detection Using a Hybrid CNN–RNN Model Enhanced with Multi-Head Attention for Cloud Infrastructure. Applied Sciences. 2025; 15(21):11567. https://doi.org/10.3390/app152111567
Chicago/Turabian StyleSathaporn, Posathip, Woranidtha Krungseanmuang, Vasutorn Chaowalittawin, Chawalit Benjangkaprasert, and Boonchana Purahong. 2025. "DDoS Detection Using a Hybrid CNN–RNN Model Enhanced with Multi-Head Attention for Cloud Infrastructure" Applied Sciences 15, no. 21: 11567. https://doi.org/10.3390/app152111567
APA StyleSathaporn, P., Krungseanmuang, W., Chaowalittawin, V., Benjangkaprasert, C., & Purahong, B. (2025). DDoS Detection Using a Hybrid CNN–RNN Model Enhanced with Multi-Head Attention for Cloud Infrastructure. Applied Sciences, 15(21), 11567. https://doi.org/10.3390/app152111567

