{"id":"https://openalex.org/W4285813750","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824189","title":"A Multi-Classifier for DDoS Attacks Using Stacking Ensemble Deep Neural Network","display_name":"A Multi-Classifier for DDoS Attacks Using Stacking Ensemble Deep Neural Network","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813750","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824189"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9824189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824189","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017183911","display_name":"Moinul Islam Sayed","orcid":"https://orcid.org/0000-0001-5102-043X"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Moinul Islam Sayed","raw_affiliation_strings":["University of Western Ontario,Department of Computer Science,London,ON,Canada","Department of Computer Science, University of Western Ontario, London, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Western Ontario,Department of Computer Science,London,ON,Canada","institution_ids":["https://openalex.org/I125749732"]},{"raw_affiliation_string":"Department of Computer Science, University of Western Ontario, London, ON, Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050964910","display_name":"Ibrahim Mohammed Sayem","orcid":"https://orcid.org/0009-0008-3620-0959"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ibrahim Mohammed Sayem","raw_affiliation_strings":["University of Western Ontario,Department of Computer Science,London,ON,Canada","Department of Computer Science, University of Western Ontario, London, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Western Ontario,Department of Computer Science,London,ON,Canada","institution_ids":["https://openalex.org/I125749732"]},{"raw_affiliation_string":"Department of Computer Science, University of Western Ontario, London, ON, Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087889739","display_name":"Sajal Saha","orcid":"https://orcid.org/0000-0002-1429-9387"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sajal Saha","raw_affiliation_strings":["University of Western Ontario,Department of Computer Science,London,ON,Canada","Department of Computer Science, University of Western Ontario, London, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Western Ontario,Department of Computer Science,London,ON,Canada","institution_ids":["https://openalex.org/I125749732"]},{"raw_affiliation_string":"Department of Computer Science, University of Western Ontario, London, ON, Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011011621","display_name":"Anwar Haque","orcid":"https://orcid.org/0000-0002-5253-0455"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Anwar Haque","raw_affiliation_strings":["University of Western Ontario,Department of Computer Science,London,ON,Canada","Department of Computer Science, University of Western Ontario, London, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Western Ontario,Department of Computer Science,London,ON,Canada","institution_ids":["https://openalex.org/I125749732"]},{"raw_affiliation_string":"Department of Computer Science, University of Western Ontario, London, ON, Canada","institution_ids":["https://openalex.org/I125749732"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017183911"],"corresponding_institution_ids":["https://openalex.org/I125749732"],"apc_list":null,"apc_paid":null,"fwci":3.6717,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.95272525,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1125","last_page":"1130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8771680593490601},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8731181025505066},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6712456345558167},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5621913075447083},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5335367918014526},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5077325105667114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44947993755340576},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44298499822616577},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4137190878391266},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.41025295853614807},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34783411026000977},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2080242931842804}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8771680593490601},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8731181025505066},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6712456345558167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5621913075447083},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5335367918014526},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5077325105667114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44947993755340576},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44298499822616577},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4137190878391266},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.41025295853614807},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34783411026000977},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2080242931842804},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9824189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824189","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1689711448","https://openalex.org/W2101234009","https://openalex.org/W2141409867","https://openalex.org/W2157331557","https://openalex.org/W2253429366","https://openalex.org/W2577968487","https://openalex.org/W2625013748","https://openalex.org/W2886222960","https://openalex.org/W2919115771","https://openalex.org/W2924689635","https://openalex.org/W2979590797","https://openalex.org/W2982682021","https://openalex.org/W2988030669","https://openalex.org/W2991210281","https://openalex.org/W3095075163","https://openalex.org/W3116027269","https://openalex.org/W3150635270","https://openalex.org/W3151601825","https://openalex.org/W3156402417","https://openalex.org/W3164987805","https://openalex.org/W3172076356","https://openalex.org/W3172504943","https://openalex.org/W3186003301","https://openalex.org/W3209469313","https://openalex.org/W3213057391","https://openalex.org/W4200206556","https://openalex.org/W4206709449","https://openalex.org/W6675354045","https://openalex.org/W6969259846"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"DDoS":[0,45,60,92,138,146,176],"(Distributed":[1],"Denial":[2],"of":[3,17,25,91,137,175,232],"Service)":[4],"attacks":[5,93,147,177],"have":[6],"emerged":[7],"as":[8,214],"a":[9,44,48,101,162],"serious":[10],"menace":[11],"to":[12,29,84,178,222],"the":[13,32,86,153,180],"security":[14],"and":[15,19,35,51,74,88,105,117,155,198,203],"integrity":[16],"data":[18],"information":[20],"systems.":[21],"The":[22],"primary":[23],"aim":[24],"this":[26],"attack":[27,46,61,108,154],"is":[28,47],"take":[30],"down":[31],"targeted":[33],"system":[34],"prevent":[36],"legitimate":[37],"users":[38],"from":[39],"accessing":[40],"its":[41,142],"services.":[42],"Identifying":[43],"challenging":[49],"task,":[50],"it":[52],"must":[53],"be":[54,149],"performed":[55],"before":[56],"initiating":[57],"any":[58],"countermeasure.":[59],"detection":[62],"has":[63],"been":[64],"effectively":[65],"applied":[66],"in":[67],"many":[68,79,135],"studies":[69,127],"using":[70,165],"Machine":[71],"Learning":[72,76],"(ML)":[73],"Deep":[75],"(DL).":[77],"However,":[78],"existing":[80],"models":[81,209],"are":[82,134],"unable":[83],"recognize":[85],"distinct":[87],"dynamic":[89],"behavior":[90],"because":[94],"they":[95],"employ":[96],"datasets":[97,212],"that":[98,171,206],"were":[99],"produced":[100],"long":[102],"time":[103],"ago":[104],"lack":[106],"up-to-date":[107],"scenarios,":[109],"do":[110,118],"not":[111,119],"include":[112],"packet-based":[113],"bi-directional":[114],"traffic":[115],"flow,":[116],"contain":[120],"complete":[121],"network":[122],"traffic.":[123],"In":[124],"addition,":[125],"most":[126],"carried":[128],"out":[129],"binary":[130],"classification,":[131],"however,":[132],"there":[133],"types":[136,174],"attacks,":[139],"each":[140],"with":[141,210],"unique":[143],"characteristics.":[144],"Classifying":[145],"can":[148,228],"useful":[150],"when":[151],"thwarting":[152],"taking":[156],"preventive":[157],"measures.":[158],"This":[159],"paper":[160],"presents":[161],"multi-classifier":[163],"model":[164,187,219,227],"stacking":[166],"ensemble":[167,216],"deep":[168],"neural":[169],"networks":[170],"identify":[172],"several":[173],"address":[179],"issues":[181],"mentioned":[182],"above.":[183],"Our":[184],"proposed":[185,226],"hybrid":[186],"incorporates":[188],"Convolution":[189],"Neural":[190],"Network":[191],"(CNN),":[192],"Long":[193],"Short":[194],"Term":[195],"Memory":[196],"(LSTM),":[197],"Gated":[199],"Recurrent":[200],"Unit":[201],"(GRU),":[202],"we":[204],"show":[205],"while":[207],"evaluating":[208],"large":[211],"such":[213],"CIC-DDoS2019,":[215],"technique":[217],"increases":[218],"performance.":[220],"According":[221],"experimental":[223],"results,":[224],"our":[225],"reach":[229],"an":[230],"accuracy":[231],"89.4%,":[233],"which":[234],"outperforms":[235],"other":[236],"similar":[237],"methods.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
