IJEM Vol. 16, No. 1, 8 Feb. 2026
Cover page and Table of Contents: PDF (size: 663KB)
PDF (663KB), PP.39-49
Views: 0 Downloads: 0
Denial of Service, Deep Learning, NSL-KDD Dataset, Intrusion Detection, Computer Network, Attacks
This study investigates the application of deep learning techniques for the detection of Denial of Service (DoS) attacks in network traffic using the NSL-KDD dataset. A Deep Neural Network (DNN) model is proposed and optimized for intrusion detection. The model consists of a 41-feature input layer, two fully connected hidden layers containing 128 and 64 neurons respectively and a SoftMax activated output layer for multiclass classification. The hidden layer used ReLU activation function and the model was optimized using Adam optimizer. The dataset was preprocessed using feature encoding, normalization and label transformation. The dataset was used with its standard predefined split: KDDTrain+ for training/validation and KDDTest+ for testing. The training data was further divided into 80% for training and 20% for validation. The effectiveness of the DNN was compared against traditional machine learning models, including Logistic Regression, LightGBM (LGBM), and CatBoost. Key evaluation metrics such as accuracy, precision, recall, and F1-score are used to assess the effectiveness of each model in detecting network intrusions. The results demonstrate that the DNN model achieves an accuracy of 86% on the test dataset, consistently outperforming the traditional models across all key metrics. These findings highlight the advantages of deep learning for anomaly-based intrusion detection, particularly in handling complex network traffic patterns. This study contributes to advancing network security by leveraging the capabilities of DNNs for real-time DoS detection, scalability, and practical implementation in modern cybersecurity frameworks.
Obiageli M. Attoh, Oduware Okosun, "Development of a Deep Learning Model for Detecting DOS Attacks in Computer Networks", International Journal of Engineering and Manufacturing (IJEM), Vol.16, No.1, pp. 39-49, 2026. DOI:10.5815/ijem.2026.01.04
[1]M. Mittal, K. Kumar, and S. Behal, “Deep learning approaches for detecting DDoS attacks: A systematic review,” Soft Computing, vol. 27, pp. 13039–13075, 2023, doi: 10.1007/s00500-021-06608-1.
[2]National Cyber Security Centre, Denial of Service (DoS) Guidance Collection, ver. 1.0, rev. Mar. 25, 2024. [Online]. Available: https://www.ncsc.gov.uk/collection/denial-service-dos-guidance-collection.
[3]V. Venkatesh and S. Rao, “Impact analysis of DDoS attacks on enterprise networks,” SN Computer Science, vol. 3, article 145, 2022.
[4]H. Singh and H. Sharma, “Intrusion detection techniques: A review,” International Journal of Computer Applications, vol. 182, no. 25, 2020.
[5]Kaspersky, “Africa Cyberthreat Landscape Report 2025,” Kaspersky, Apr. 2025. [Online]. Available: https://content.kaspersky-labs.com/se/media/en/africa-cyberthreat-landscape-report-2025.pdf (accessed Oct. 29, 2025).
[6]GMI Cloud, “Deep Learning: The Power Behind Modern AI Systems,” GMI Cloud. [Online]. Available: https://www.gmicloud.ai/glossary/deep-learning. [Accessed: Nov. 22, 2025].
[7]A. K. Silivery, K. Ram, and L. K. Suresh Kumar, “An Effective Deep Learning Based Multi-Class Classification of DoS and DDoS Attack Detection,” International Journal of Electrical and Computer Engineering Systems (IJECES), vol. 14, no. 4, pp. 421–431, Apr. 2023.
[8]M. Tavallaee, E. Bagheri, W. Lu and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 2009, pp. 1-6, doi: 10.1109/CISDA.2009.5356528..
[9]A. A. Salih, S. Y. Ameen, S. R. M. Zeebaree, M. A. M. Sadeeq, S. F. Kak, N. Omar, I. M. Ibrahim, H. M. Yasin, Z. N. Rashid, and Z. S. Ageed, “Deep Learning Approaches for Intrusion Detection,” Asian Journal of Research in Computer Science, vol. 9, no. 4, pp. 50–64, 2021.
[10]D. Ajalkar, V. Chavan and P. Bhosle, “Machine Learning Based Intrusion Detection System,” International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), vol. 5, no. 10, Apr. 2025, doi: 10.48175/IJARSCT-25679.
[11]M. Ramzan, M. Shoaib, A. Altaf, S. Arshad, F. Iqbal, Á. K. Castilla, and I. Ashraf, "Distributed Denial of Service attack detection in network traffic using deep learning algorithm," Sensors, vol. 23, no. 20, p. 8642, 2023, doi: 10.3390/s23208642.
[12]S. K. Alladi, "Effectively improving the efficiency and performance of an intrusion detection system using hybrid machine learning models," M.S. thesis, School of Computing, National College of Ireland, 2020.
[13]O. Edosa, A. E. Ibhaze, E. C. Ekoko, and P. E. Orukpe, "Development of an intrusion detection system leveraging deep learning model classification," Advances in Knowledge Based Systems, Data Science, and Cybersecurity, vol. 1, no. 1, pp. 38–48, 2024.
[14]S. Rawat, A. Srinivasan, V. Ravi, and U. Ghosh, "Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network," *Internet Technology Letters*, vol. 5, no. 1, p. e232, 2022.