{"id":"https://openalex.org/W4392469887","doi":"https://doi.org/10.3390/s24051672","title":"ML-Based Detection of DDoS Attacks Using Evolutionary Algorithms Optimization","display_name":"ML-Based Detection of DDoS Attacks Using Evolutionary Algorithms Optimization","publication_year":2024,"publication_date":"2024-03-05","ids":{"openalex":"https://openalex.org/W4392469887","doi":"https://doi.org/10.3390/s24051672","pmid":"https://pubmed.ncbi.nlm.nih.gov/38475208"},"language":"en","primary_location":{"id":"doi:10.3390/s24051672","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s24051672","pdf_url":"https://www.mdpi.com/1424-8220/24/5/1672/pdf?version=1709621564","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1424-8220/24/5/1672/pdf?version=1709621564","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059040432","display_name":"Fauzia Talpur","orcid":null},"institutions":[{"id":"https://openalex.org/I126131087","display_name":"University of Sindh","ror":"https://ror.org/01d692d57","country_code":"PK","type":"education","lineage":["https://openalex.org/I126131087"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Fauzia Talpur","raw_affiliation_strings":["Institute of Mathematics & Computer Science, University of Sindh, Jamshoro 70680, Sindh, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Mathematics & Computer Science, University of Sindh, Jamshoro 70680, Sindh, Pakistan","institution_ids":["https://openalex.org/I126131087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060109059","display_name":"Imtiaz Ali Korejo","orcid":null},"institutions":[{"id":"https://openalex.org/I126131087","display_name":"University of Sindh","ror":"https://ror.org/01d692d57","country_code":"PK","type":"education","lineage":["https://openalex.org/I126131087"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Imtiaz Ali Korejo","raw_affiliation_strings":["Institute of Mathematics & Computer Science, University of Sindh, Jamshoro 70680, Sindh, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Mathematics & Computer Science, University of Sindh, Jamshoro 70680, Sindh, Pakistan","institution_ids":["https://openalex.org/I126131087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087554584","display_name":"Aftab Ahmed Chandio","orcid":"https://orcid.org/0000-0002-5752-0520"},"institutions":[{"id":"https://openalex.org/I126131087","display_name":"University of Sindh","ror":"https://ror.org/01d692d57","country_code":"PK","type":"education","lineage":["https://openalex.org/I126131087"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Aftab Ahmed Chandio","raw_affiliation_strings":["Institute of Mathematics & Computer Science, University of Sindh, Jamshoro 70680, Sindh, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Mathematics & Computer Science, University of Sindh, Jamshoro 70680, Sindh, Pakistan","institution_ids":["https://openalex.org/I126131087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072305228","display_name":"Ali Ghulam","orcid":"https://orcid.org/0000-0001-5166-2213"},"institutions":[{"id":"https://openalex.org/I47904161","display_name":"Sindh Agriculture University","ror":"https://ror.org/04s6jxt38","country_code":"PK","type":"education","lineage":["https://openalex.org/I47904161"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ali Ghulam","raw_affiliation_strings":["Information Technology Centre, Sindh Agriculture University, Tandojam 70060, Sindh, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-5166-2213","affiliations":[{"raw_affiliation_string":"Information Technology Centre, Sindh Agriculture University, Tandojam 70060, Sindh, Pakistan","institution_ids":["https://openalex.org/I47904161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000013684","display_name":"Mir Sajjad Hussain Talpur","orcid":"https://orcid.org/0000-0001-9897-3916"},"institutions":[{"id":"https://openalex.org/I47904161","display_name":"Sindh Agriculture University","ror":"https://ror.org/04s6jxt38","country_code":"PK","type":"education","lineage":["https://openalex.org/I47904161"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mir. Sajjad Hussain Talpur","raw_affiliation_strings":["Information Technology Centre, Sindh Agriculture University, Tandojam 70060, Sindh, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Technology Centre, Sindh Agriculture University, Tandojam 70060, Sindh, Pakistan","institution_ids":["https://openalex.org/I47904161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060109059"],"corresponding_institution_ids":["https://openalex.org/I126131087"],"apc_list":{"value":2400,"currency":"CHF","value_usd":2598},"apc_paid":{"value":2400,"currency":"CHF","value_usd":2598},"fwci":6.7659,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.97145051,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"24","issue":"5","first_page":"1672","last_page":"1672"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8486049175262451},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6934106945991516},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6064688563346863},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5683690309524536},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5004189014434814},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.4911942183971405},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.46821096539497375},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.44054707884788513},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.4281250834465027},{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.42647671699523926},{"id":"https://openalex.org/keywords/optimization-algorithm","display_name":"Optimization algorithm","score":0.4157883822917938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21745824813842773},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19211405515670776},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.13958856463432312}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8486049175262451},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6934106945991516},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6064688563346863},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5683690309524536},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5004189014434814},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.4911942183971405},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.46821096539497375},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.44054707884788513},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.4281250834465027},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.42647671699523926},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.4157883822917938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21745824813842773},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19211405515670776},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.13958856463432312},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/s24051672","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s24051672","pdf_url":"https://www.mdpi.com/1424-8220/24/5/1672/pdf?version=1709621564","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},{"id":"pmid:38475208","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/38475208","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors (Basel, Switzerland)","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:10935225","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/10935225","pdf_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC10935225/pdf/sensors-24-01672.pdf","source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors (Basel)","raw_type":"Text"},{"id":"pmh:oai:doaj.org/article:01b56787dd2648fa8b14b461a67bd0bb","is_oa":true,"landing_page_url":"https://doaj.org/article/01b56787dd2648fa8b14b461a67bd0bb","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors, Vol 24, Iss 5, p 1672 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/s24051672","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s24051672","pdf_url":"https://www.mdpi.com/1424-8220/24/5/1672/pdf?version=1709621564","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4392469887.pdf"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W752968074","https://openalex.org/W1967271207","https://openalex.org/W1989965130","https://openalex.org/W2051202352","https://openalex.org/W2074553104","https://openalex.org/W2091693228","https://openalex.org/W2146277666","https://openalex.org/W2163679388","https://openalex.org/W2469661497","https://openalex.org/W2552899443","https://openalex.org/W2560525084","https://openalex.org/W2597472767","https://openalex.org/W2737934037","https://openalex.org/W2788857842","https://openalex.org/W2799843691","https://openalex.org/W2901542879","https://openalex.org/W2919121218","https://openalex.org/W2937711216","https://openalex.org/W2947123069","https://openalex.org/W2966710162","https://openalex.org/W2994384010","https://openalex.org/W3003272299","https://openalex.org/W3035387070","https://openalex.org/W3059506646","https://openalex.org/W3081430061","https://openalex.org/W3094117827","https://openalex.org/W3101102032","https://openalex.org/W3108827348","https://openalex.org/W3139139596","https://openalex.org/W3148378511","https://openalex.org/W3161554626","https://openalex.org/W3194105363","https://openalex.org/W3201318612","https://openalex.org/W4200175804","https://openalex.org/W4245256586","https://openalex.org/W4287833982","https://openalex.org/W4297964706","https://openalex.org/W4312916746","https://openalex.org/W4387096259","https://openalex.org/W4391151732","https://openalex.org/W4391168830","https://openalex.org/W6681733303","https://openalex.org/W6759883976","https://openalex.org/W6773882305","https://openalex.org/W6792955470","https://openalex.org/W6859313598"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2073248645","https://openalex.org/W2022485595","https://openalex.org/W3212179065","https://openalex.org/W2184070258","https://openalex.org/W3087997050","https://openalex.org/W2348923905"],"abstract_inverted_index":{"The":[0,156],"escalating":[1],"reliance":[2],"of":[3,18,28,39,68,83,212],"modern":[4],"society":[5],"on":[6,145],"information":[7],"and":[8,54,62,80,104,116,148,151,175,220,228],"communication":[9],"technology":[10],"has":[11,86],"rendered":[12],"it":[13],"vulnerable":[14],"to":[15,50,134,139,184],"an":[16,96],"array":[17],"cyber-attacks,":[19],"with":[20,125,168,173,177,195],"distributed":[21],"denial-of-service":[22],"(DDoS)":[23],"attacks":[24,85,136],"emerging":[25],"as":[26,201],"one":[27],"the":[29,37,48,66,78,109,169,180,186,196,202,210,225],"most":[30,203],"prevalent":[31],"threats.":[32,235],"This":[33,93,206],"paper":[34],"delves":[35],"into":[36],"intricacies":[38],"DDoS":[40,84,135,213],"attacks,":[41],"which":[42],"exploit":[43],"compromised":[44],"machines":[45],"numbering":[46],"in":[47,59,90],"thousands":[49],"disrupt":[51],"data":[52],"services":[53],"online":[55],"commercial":[56],"platforms,":[57],"resulting":[58],"significant":[60],"downtime":[61],"financial":[63],"losses.":[64],"Recognizing":[65],"gravity":[67],"this":[69],"issue,":[70],"various":[71],"detection":[72,82,215],"techniques":[73],"have":[74],"been":[75],"explored,":[76],"yet":[77],"quantity":[79],"prior":[81],"seen":[87],"a":[88,191,218],"decline":[89],"recent":[91],"methods.":[92],"research":[94,207],"introduces":[95],"innovative":[97],"approach":[98],"by":[99,216],"integrating":[100],"evolutionary":[101],"optimization":[102],"algorithms":[103],"machine":[105,141,192],"learning":[106,142,193],"techniques.":[107],"Specifically,":[108],"study":[110,181],"proposes":[111],"XGB-GA":[112,170,200],"Optimization,":[113,115],"RF-GA":[114],"SVM-GA":[117],"Optimization":[118,124,128],"methods,":[119],"employing":[120],"Evolutionary":[121],"Algorithms":[122],"(EAs)":[123],"Tree-based":[126],"Pipelines":[127],"Tool":[129],"(TPOT)-Genetic":[130],"Programming.":[131],"Datasets":[132],"pertaining":[133],"were":[137,158],"utilized":[138],"train":[140],"models":[143,157],"based":[144],"XGB,":[146],"RF,":[147],"SVM":[149],"algorithms,":[150],"10-fold":[152],"cross-validation":[153],"was":[154],"employed.":[155],"further":[159],"optimized":[160],"using":[161],"EAs,":[162],"achieving":[163],"remarkable":[164],"accuracy":[165],"scores:":[166],"99.99%":[167,176],"method,":[171],"99.50%":[172],"RF-GA,":[174],"SVM-GA.":[178],"Furthermore,":[179],"employed":[182],"TPOT":[183],"identify":[185],"optimal":[187],"algorithm":[188,198],"for":[189],"constructing":[190],"model,":[194],"genetic":[197],"pinpointing":[199],"effective":[204],"choice.":[205],"significantly":[208],"advances":[209],"field":[211],"attack":[214],"presenting":[217],"robust":[219],"accurate":[221],"methodology,":[222],"thereby":[223],"enhancing":[224],"cybersecurity":[226],"landscape":[227],"fortifying":[229],"digital":[230],"infrastructures":[231],"against":[232],"these":[233],"pervasive":[234]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":6}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
