algorithms-18-00209
algorithms-18-00209
Review
DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark; [email protected] (M.B.B.);
[email protected] (S.D.); [email protected] (M.K.); [email protected] (M.B.L.); [email protected] (M.P.);
[email protected] (G.C.)
* Correspondence: [email protected]
Abstract: This paper presents a systematic literature review based on the PRISMA model
on machine learning-based Distributed Denial of Service (DDoS) attacks in Internet of
Things (IoT) networks. The primary objective of the review is to compare research trends
on deployment options, datasets, and machine learning techniques used in the domain
between 2019 and 2024. The results highlight the dominance of certain datasets (BoT-IoT
and TON_IoT) in combination with Decision Tree (DT) and Random Forest (RF) models,
achieving high median accuracy rates (>99%). This paper discusses various datasets that
are used to train and evaluate machine learning (ML) models for detecting Distributed
Denial of Service (DDoS) attacks in Internet of Things (IoT) networks and how they impact
model performance. Furthermore, the findings suggest that due to hardware limitations,
there is a preference for lightweight ML solutions and preprocessed datasets. Current
trends indicate that larger or industry-specific datasets will continue to gain popularity
alongside more complex ML models, such as deep learning. This emphasizes the need
for robust and scalable deployment options, with Software-Defined Networks (SDNs)
offering flexibility, edge computing being extensively explored in cloud environments, and
blockchain-integrated networks emerging as a promising approach for enhancing security.
Academic Editors: Shun Zhang, Feng Keywords: intrusion detection system (IDS); internet of things (IoT) network; distributed
Gao and Mingyang Ma denial of service (DDoS); machine learning (ML); systematic review
Received: 8 March 2025
Revised: 26 March 2025
Accepted: 4 April 2025
Published: 9 April 2025 1. Introduction
Citation: Bankó, M.B.; Dyszewski, S.;
The IoT refers to devices that are connected and communicate with one another, typi-
Králová, M.; Limpek, M.B.;
cally described as an IoT network. Whether they are used in your smart home, agriculture,
Papaioannou, M.; Choudhary, G.;
Dragoni, N. Advancements in
or medical tools, IoT devices are important to the functioning of the digital world and
Machine Learning-Based Intrusion are quite vulnerable from a cybersecurity perspective. One of the key properties of these
Detection in IoT: Research Trends and devices is that they are resource-limited, meaning that they are an obvious target of dif-
Challenges. Algorithms 2025, 18, 209. ferent forms of cyberattacks, including DDoS. Given their wide adoption in daily life and
https://doi.org/10.3390/a18040209
industry, estimates vary regarding the actual number of IoTs devices in use, with some
Copyright: © 2025 by the authors. sources claiming that there were expected to be approximately 20 billion IoTs devices [1] by
Licensee MDPI, Basel, Switzerland. the end of 2024. However, Forbes claimed a figure over tenfold of that [2]. That being said,
This article is an open access article
the need for a robust security solution for this popular technology is obvious.
distributed under the terms and
Intrusion detection system (IDS) based on ML appear to be a natural first choice to
conditions of the Creative Commons
Attribution (CC BY) license
explore. ML’s flexibility offers a number of benefits, including real-time detection of DDoS
(https://creativecommons.org/ attacks through network analysis. Furthermore, the option of running ML algorithms on
licenses/by/4.0/). different systems can prove useful when memory and computational power are limited.
Hence, we use this review as a foundational point to discuss the ML techniques that the
current literature proposes. In order to draw more accurate conclusions from our research,
we identify the datasets that the ML models are trained and tested on, as different datasets
may vary in important properties, which may in turn impact the performance metrics of
the proposed models. Finally, we also consider the deployment environments proposed by
the reviewed papers. Given the constraints of IoT technology, the deployment options can
have an impact on the construction of the ML models and vice versa.
This paper presents a large-scale, in-depth analysis with a distinct focus on DDoS
attacks, distinguishing it from more general or smaller-scale surveys, which are discussed
in greater detail in Section 3. Additionally, our work provides a comprehensive, multi-
dimensional examination of the field, covering deployment strategies, dataset usage, and
a comparative evaluation of ML models, offering a level of detail and a combination of
insights not found in previous reviews.
This paper aims to follow the PRISMA structure in building up a literature review on
ML-based IDSs for DDoS attacks in IoT networks. Our contributions to the topic include
creating an updated survey on the deployment options, datasets, and ML techniques used
in the academic literature published on the topic. We also compare our results in order to
find consistent characteristics as well as gaps in current research and offer direction for
future research. In particular, we aim to answer the following research questions:
1. What are the deployment/platform solutions using machine learning proposed for
mitigating DDoS attacks on IoT networks?
2. Which datasets are used to train and evaluate ML models for detecting DDoS attacks
in IoT networks and how do they impact model performance?
3. How do different ML models compare based on performance metrics, and what
factors contribute to achieving high accuracy rates?
4. What trends have emerged in the use of machine learning for DDoS detection in
IoT networks?
While other reviews on this topic have been published in the past 6 years, this paper
stands out in that it includes significantly more reviewed literature than the comparable
surveys. Moreover, this paper focuses on DDoS attacks and creates a broad survey of
relevant surrounding elements, such as the datasets used, various performance metrics,
and deployment contexts, which other papers may omit. Furthermore, with the PRISMA
framework, this paper is replicable and follows a standardized research structure.
To give an outline of this paper, Section 1 introduces this paper and motivation, while
Section 2 denotes the methodology this paper is based on. Section 3 provides the reader
with a foundational understanding of the discussed domain, while Sections 4–6 offer a full
overview of the literature reviewed. We discuss the results found in Section 7, propose
future research directions in Section 8, and conclude the survey in Section 9.
2. Methodology
2.1. Systematic Literature Review Strategy
Selecting a structured framework for conducting a systematic literature review is a
customary and essential practice in academic research. It ensures methodological precision,
transparency, and reproducibility, enabling researchers to trust and draw reliable conclu-
sions. For its widely accepted and utilized status in the scientific community, we elected to
follow and conduct our review using the Preferred Reporting Items for Systematic Reviews
and Meta-Analyses (PRISMA) [3] framework for this review, ensuring a structured and
transparent research process. The PRISMA framework, first introduced in 2009 and later
refined, is a widely recognized standard for systematic reviews and meta-analyses. It
Algorithms 2025, 18, 209 3 of 34
• DTU FindIt: 65
• IEEE Xplore: 20
These contained 15 duplicates in total; therefore, we concluded our search by identify-
ing 70 unique papers.
During the selection process, certain papers identified in the initial database searches
were excluded for a variety of reasons. Some studies were removed due to incomplete
documentation, lack of peer review, or insufficient methodological details, which limited
their reliability for synthesis. Others were excluded because their scope extended beyond
the focus of this review. Duplicate records and papers presenting redundant findings were
also filtered out to ensure a focused and high-quality set of papers for further analysis.
3. Field Assessment
This chapter defines the key components of the reviewed topic. The components
discussed in the literature review are examined individually, but their interconnec-
tions—including associated challenges—are also emphasized.
Algorithms 2025, 18, 209 5 of 34
3.1. IoT
There are many definitions to describe IoT. According to [8], “The IoT is a system
of networked physical objects that contain embedded hardware and software to sense
or interact with the physical world, including human beings”. Based on this definition,
IoT devices operate in a system or network, forming an interconnected ecosystem where
devices communicate and collaborate to perform specific tasks or achieve shared goals.
This connection enables seamless data exchange and interaction between devices and their
environments, driving automation, efficiency, and advanced analytics capabilities. We can
refer to such interconnected systems as IoT networks. The number of connected IoT devices
was expected to grow by 13% in 2024, reaching 18.8 billion, up from 16.6 billion in 2023,
which marked a 15% increase over 2022 [1]. IoT devices are now present in nearly every
industry, with some also forming part of critical infrastructure.
IoT has become a crucial topic due to the inherent limitations of many IoT devices.
This includes low computational power due to these devices being originally created to
perform specific tasks efficiently. Furthermore, security-related features, such as encryption,
may not be fully implemented. While data collection and processing are essential for IoT
applications, privacy issues arise at various stages of this process [9]. Also, the nodes
within an IoT network are susceptible to numerous attacks aiming to disrupt the services
provided by the IoT or take over the entire network. One of the most significant security
threats to IoT systems is DDoS attacks [10,11]. As such, IoT network security has become a
well-researched field in the scientific community. For the keywords ‘IoT security’, IEEE
Explore [12] returns 4405 results between 2024 and 2025. In this systematic literature review,
a subfield of IoT security is reviewed and aims to present the current state of the field.
3.3. DDoS
A Denial of Service (DoS) attack (commonly referred to as a flood attack), in its simplest
form, involves configuring a device on the internet to repeatedly send requests to another
computer, bypassing the default settings of the command. The data size of each request
can be significantly increased, and the time interval between transmissions can be greatly
reduced. As a result, the target device becomes overwhelmed with an excessive amount
of unnecessary data, ultimately causing it to stop functioning properly. DDoS attacks
are highly covert and cause significant damage by allowing attackers to stay anonymous.
The process involves creating malicious code designed to target specific systems when
triggered. This code spreads across poorly secured systems on the internet and, once
activated, launches an attack from these infected systems simultaneously [15].
These types of attacks (DoS and DDoS) not only prevent legitimate users from ac-
cessing (essential) services, but may lead to further consequences, including increased
costs due to service downtime, recovery efforts, or missed opportunities. Consumed
bandwidth, processing power, and other network resources cause collateral damage to
surrounding systems.
DDoS attacks, while impossible to completely prevent due to the decentralized nature
of the internet, can be effectively managed through a combination of strategies. Adjusting
infrastructure configurations is a crucial step, as demonstrated in the late 1990s when
default router settings were changed to counter Smurf attacks. A Smurf attack is a type
of amplification attack where an attacker sends ICMP echo request packets (pings) to a
network’s broadcast address, spoofing the source IP to be the victim’s address. This causes
all devices on the network to respond with ICMP echo replies to the victim, overwhelming
their system with traffic. Similarly, addressing vulnerabilities like open recursive Domain
Name System (DNS) servers is critical to preventing DNS amplification attacks, although
progress in reconfiguring these servers remains slow. Filtering distinct or unusual traffic
patterns at ingress points is an effective method to minimize disruption by DoS or DDoS
attacks. For instance, upstream routers can block Internet Control Message Protocol (ICMP)
echo request traffic to stop ping flood attacks, while other anomalous traffic can be safely
discarded based on profile analysis. Distributed hosting infrastructures, such as Akamai,
are also useful for dispersing attack traffic across multiple highly connected nodes, reducing
the impact on any single target. However, short DNS Time-To-Live (TTL) values provide
limited benefit unless TTL entries are completely removed. A robust mitigation strategy
typically involves a multi-layered approach. Identifying and shutting down source Internet
Protocol (IP) addresses, deploying routing tricks to drop malicious traffic, and using
high-speed line filtering devices to manage extraneous traffic are all effective techniques.
Defensive measures like SYN proxies can also reduce the effectiveness of certain types
of attacks. SYN proxies are a defensive technique against DDoS attacks that involve
intercepting and managing TCP handshake requests. In large-scale scenarios where attack
traffic reaches tens of gigabits per second, collaboration with Internet Service Providers
(ISPs) to filter incoming traffic becomes essential to maintain normal operations and protect
the network [16].
This literature review aims to help further researchers in leveraging machine learning
and artificial intelligence to identify and respond to DDoS attacks in real-time by presenting
the current state of the field. To achieve this, we take a closer look at popular datasets
and ML techniques already used in relevant studies. We try to identify general trends and
compare the outcomes of the respective studies.
Algorithms 2025, 18, 209 7 of 34
3.4. IDS
According to Lee et al. [17], an IDS is a device or software application that monitors a
network for malicious activity or policy violations.
IDSs are essential tools for identifying unauthorized access or malicious activities in a
system. An intrusion involves accessing a system without authentication or authorization,
including activities like tampering with files, malware execution, or remote attempts to
compromise a system. Basic protective measures such as antivirus software and firewalls are
often insufficient, as malware signatures can be altered and firewall rules can be bypassed.
An IDS provides comprehensive monitoring by analyzing incoming and outgoing network
traffic as well as detecting intrusions, malicious packets, and policy violations. It records
logs and alerts system administrators in real time, offering robust security for organizations.
IDS solutions are also available as hardware platforms or software applications and are
increasingly adopting machine learning algorithms to predict attacks and classify legitimate
traffic. IDS systems are categorized into three main types: Network-based IDS (NIDS),
Host-based IDS (HIDS), and Distributed IDS (DIDS) [18].
IDSs can be classified by their detection methods, including signature-based anal-
ysis, which identifies known attack patterns; protocol-based analysis, which monitors
compliance with protocol rules to detect violations; and anomaly-based analysis, which
focuses on spotting unusual behavior to identify potential unknown threats. These meth-
ods collectively strengthen IDS capabilities in detecting and mitigating cyberattacks. The
anomaly-based analysis addresses limitations in signature-based approaches by detecting
unknown and known attacks through abnormal network behavior. Unlike relying on
predefined signatures, this method uses heuristic rules or machine learning to classify
traffic. It operates in two phases: training to learn the normal behavior of the system and
testing to identify deviations indicating anomalies. Techniques such as neural networks,
data mining, and artificial immune systems are used, supported by other tools. However, a
notable drawback is the occurrence of false positives, where alarms are triggered without
actual threats. Research continues to improve accuracy and reduce false alarms [18].
DDoS detection. An overview of recent advancements in ML-based IDS systems for DDoS
detection in IoT networks can be seen in Table 1.
Table 1. State-of-the-art surveys in ML-based IDS systems on DDoS attacks in IoT network domain
(1: threats and attacks, 2: mitigation, 3: performance metrics, 4: research gap), [✓: included,
-: not included].
The reviewed studies highlight the significance of ML- and DL-based IDS solutions for
detecting DDoS in IoT networks. While various approaches have been explored, including
anomaly detection, ensemble learning, and adaptive models, challenges such as dataset di-
versity, real-time implementation, and scalability remain. Compared to previous works, our
paper provides a more detailed evaluation of ML-based IDS systems, particularly focusing
on performance metrics, dataset utilization, and model comparisons. By addressing gaps
such as underexplored datasets and improving detection accuracy, our study contributes
to advancing IDS research in IoT security. Moreover, we prioritized including the latest
Algorithms 2025, 18, 209 9 of 34
studies (published between 2018 and 2024) in our paper, further distinguishing it from
other surveys.
stopping packets are updated; on the other hand, if the window period is still open, the
process follows existing protocols.
In [10,36,37], the control plane detection is appended by application layer modules,
which are used to describe the requirements or desired behavior of the network. In
both cases, this layer and the IDS module receive network data and perform ML tasks.
Mazhar et al. [37] specifically highlighted the performance and scaling capabilities of their
research, suggesting that high-throughput research centers could be beneficiaries. The
paper compares the performance of their IDS system in a centralized vs. distributed context
of IoT networks, and found that the IDS system tested uses fewer resources and is quite
suitable for low-power devices, such as IoT devices.
Ref. [38] establishes the GADAD (Genetic Algorithm DDoS Attack Detection) system,
which focuses on edge-based technologies in stateful SDN-based networks. The GADAD
system employs tree-based learning techniques and is designed to be deployed on edge
devices in IoT networks to detect both high- and low-volume DDoS attacks. There are
three main phases: network traffic preprocessing, feature engineering, and learning. In
the first phase, it captures network traffic data exchanged between sensors and the edge
server using Wireshark, and flow features are extracted using Zeek. The flow features are
effective in both high- and low-volume attacks compared to packet-based features. The
system introduces feature and depth tuning, a dual method that reduces memory usage
without compromising the system’s detection capabilities. These trained models are then
employed to detect and classify incoming network traffic data on the edge server.
However, SDN networks introduce trade-offs, such as a centralized controller being a
single point of failure. Additionally, as put in [10], the low-resource IoT devices are still
a bottleneck despite improving SDN networks; hence, scaling issues can appear when
low-latency response times require optimized and high-performance algorithms. Ref. [35]
states that the standard SDN structure suffers from single point of failure (SPOF) limitations,
a single controller, which also hinders scalability and performance.
In [51], Guerra-Manzanares et al. detail how the dataset was created for this specific
kind of circumstance. They state that this research aims to fill this substantial gap by
providing a novel IoT dataset acquired from a medium-sized IoT network architecture,
containing both real and emulated devices with 80 virtual devices and 3 physical devices
deployed. They mention that the size extension allows for the capture of malware spreading
patterns and interactions that cannot be observed in small-sized networks and that no
dataset uses the combination of emulated and real devices within the same network. The
dataset is composed of normal and actual botnet malicious network data acquired from
all the endpoints and servers during the initial propagation steps performed by Mirai,
BashLite, and Torii botnet malware.
4.8. Performance
For performance, it can be recognized that thew majority of papers focus on the
machine learning aspect for optimization. The authors of [55] propose that their model is
much more effective than the previous state-of-the-art models, thanks to feature selection
methods and feature dimensionality narrowed down to only 15 features. Compared to that,
The authors of [56] defined new, novel traffic flow features for their ML model, which fit
into fewer resources of IoT network platforms.
Others, such as in Ref. [57], use specific tools, such as SPARK, a widely popular data
engineering tool in Big Data contexts, for fast processing time and efficiency; utilized in the
cloud layer, it improves ML training, and then the model is deployed at the edge. Ref. [58]
states that better correctness and application performance brought on by deep learning’s
capacity for improved intellect can be used to spot new, novel strikes in IoT systems, which
is vital in the context of securing lightweight IoT networks. According to the numbers,
when the authors of [59] measured their ML model, after training and installation on the
network’s firewall, it reached a speed of classifying almost 3 million messages in 1 s.
There have also been different approaches in terms of integrated deployment of IDSs,
or using an additional system to append the existing network. Ref. [46] uses a designated
Blockchain Server (BCS) bearing the responsibility of recording and validating transactions,
while Ref. [60] choose to add a dedicated ML server, to combat these attacks on the network.
Opposing that, SDNs often use their flexibility, such as [37], to integrate the IDS system
into the already established network, where it is said that employing an SDN core enables
real-time intrusion detection and mitigation. In [34], Bhayo et al. adjusted the existing
network by adding a sink module to the IoT controller, containing a logging module
that logs all incoming packets in the forwarding layer. These logs are recorded in the
controller’s directory.
4.9. Conclusion
The analysis highlights that researchers aim to build adaptable solutions capable of
functioning across diverse environments, leading to minimal focus on specific deploy-
ments. In these general cases, high-quality data take precedence, often overshadowing
considerations related to network infrastructure.
Nevertheless, some architectural patterns stand out. For well-established technologies,
SDNs, Edge, and Edge–IIoT emerge as popular choices. SDNs have been widely adopted
due to their scalability and programmability. Similarly, edge computing has emerged as a
vital component in distributed computing by bringing computation closer to data sources,
reducing latency, and improving efficiency. Additionally, WSNs have been instrumental in
industrial contexts, supporting distributed sensor networks for real-time data collection
and analysis. While these technologies are widely known, blockchain has been an emerging
topic in research in recent years. Apart from its origins, blockchain and the ledger system’s
use cases have been explored since, and evolved into a versatile, decentralized framework
Algorithms 2025, 18, 209 15 of 34
Table 3. Studies assessed by their IDS deployment (only including ones that focused, or made
remarks about, infrastructure).
Datasets are usually made up of one or more files that may represent a specific file
or attack type. The most common file types are pcap, csv, and txt. These files may have
the same number of features, records, and benign/attack flows, constituting a balanced
dataset; however, unbalanced datasets are far more common. From our research, only the
Edge_IIoT dataset [83] came close to being considered balanced, the sole one out of the
eight most popular datasets used according to Figure 1. Using imbalanced datasets may
lead to biased trained models, though depending on the specifics of the ML algorithm and
data preprocessing, this does not have to be the case.
Generally, datasets can be divided into public and private, that is, those one can openly
access and use and those one cannot. Figure 2 showcases how many papers utilized public
or private datasets, excluding the papers that only include literature reviews. As is noted,
in one case [32], no dataset was specified whatsoever. The 53 papers that included public
datasets are listed in Table 4, alongside their year of publishing, the number of both records
and features, as claimed by the authors, and whether DDoS was included as an attack.
What must be noted is that due to the high variance in the way these datasets are structured
and created, some values in the table may represent an approximation of such values.
Furthermore, among the papers that included public datasets, on three occa-
sions [38,39,54], the paper also made use of self-generated or private datasets on top
of the public one to enhance or diversify the data or for testing purposes.
In the cases where self-generated or private datasets were used, the description of
how these datasets were acquired varied heavily. For example, Ref. [84] creates a tool
that is a network traffic generator for IoT devices and tests the proposed tool as well as
the generated malicious and benign data in the paper. In other cases [37,38], the paper
describes which existing tools were used to gather the data points and gives a general idea
of the number of flows, features, and/or traffic types that are a part of the dataset.
The overwhelming majority of papers carried out some form of data processing,
e.g., feature filtering or extraction, as the typical first step. In general, the papers chose
a subset of both the features and flows available in the dataset. In fact, this step seems
to be the foundation in the entire domain of ML-based IDSs, as several papers [40,78]
were primarily written with the purpose of proposing improved data preprocessing. One
particular paper [72] stands out from the rest as a standard dataset was used, but the
network traffic data were turned into images, and computer vision ML was utilised to
identify DDoS attacks.
Algorithms 2025, 18, 209 17 of 34
Among the papers, there were several common themes repeated. Firstly, we found
that multiple noted the general lack of publicly available, quality IoT datasets to be used
in their research. The stated reason for lacking datasets was privacy, as large companies
tend to not wish to share their data with researchers [85]. In particular, in cases where an
industry-specific IoT device network traffic was necessary, the papers claimed there to be
no available datasets, which typically resulted in them creating and publishing their own,
as was the case for MedBIoT [51], or self-generating a private dataset, as the paper with a
focus on smart agriculture did [86]. Further concerns were noted regarding unbalanced
datasets that may have an uneven benign-to-attack traffic ratio or unlabeled datasets. While
the majority of the reviewed datasets explicitly included DDoS attacks, a small subset did
not specify their presence, instead relying on DoS or other flooding attacks that may serve
as proxies for DDoS. As shown in Table 4, most studies in our survey utilized datasets
that explicitly feature DDoS attacks. In contrast, a few older or industry-specific datasets,
such as X-IIoTID [87], MedBIoT [51], and KDDCUP 1999 [88]—which are also relatively
infrequent in the literature—either lacked explicit DDoS attack labels or did not provide
sufficient information to confirm their inclusion.
From Figure 1, we observe the most popular datasets to be BoT-IoT [26], TON_IoT [85],
and CIC-IDS2017 [89]. Other CIC datasets are also seen among the most popular datasets.
For the sake of brevity and clarity, TON_IoT and Bot-IoT will be described in greater detail
alongside the CIC datasets, with a special focus on CIC-IDS2017.
5.1. BoT-IoT
The BoT-IoT dataset [26] was created by the Cyber Range Lab of UNSW Canberra in
2019. The dataset is labeled, imbalanced, and was generated in a realistic testbed, usable for
both binary and multiclass classification. The researchers collected data from five simulated
IoT scenarios (weather station, motion-activated lights, garage door, smart fridge, and
smart thermostat) in a testbed environment. Originally, 32 features were collected, such as
IP or port addresses, from which an additional 14 new flow features were generated, like
total or average bytes per IP, totalling 46 features for the dataset. Five types of attacks are
represented in the dataset, including DDoS, DoS, OS and Service Scan, Keylogging, and
Data exfiltration. There are over 73,000,000 attack instances in the dataset and just under
10,000 normal traffic instances in Bot-IoT, constituting an imbalanced dataset. Of the attack
records, over 38,000,000 account for DDoS attacks specifically. This imbalance has prompted
researchers in the domain to develop solutions to overcome the challenges surrounding
the use of the dataset—either by merging it with other datasets [90] or applying various
algorithms [91] to balance the dataset out.
Algorithms 2025, 18, 209 18 of 34
Table 4. Table of public datasets (✓: includes DDoS attacks in the dataset; -: not included
or unknown).
5.2. TON_IoT
The TON_IoT dataset [85] was also created by the Cyber Range Lab of UNSW Canberra
in 2020. The dataset is labeled, unbalanced, and was generated from an IoT/IIoT network
testbed. The dataset contains data from heterogeneous sources, gaining its name (TON)
from the data it includes: telemetry, operating systems, and network. The researchers
include simulated sensor data from seven IoT/IIoT sensors (weather station, motion-
activated lights, garage door, smart fridge, smart thermostat, Modbus service, and GPS)
as well as real devices: two phones and a smart TV. Nine types of attacks are represented
in the dataset, including Scanning, DoS, DDoS, ransomware, backdoor, data injection,
Cross-site Scripting, password cracking attack, and Man-in-The-Middle. There are over
22,000,000 total data records, of which just under 800,000 are normal traffic, which means
TON_IoT is also an imbalanced dataset. Over 6,000,000 of the records are from DDoS
attacks. Since the dataset contains multiple sub-datasets with unique processed or raw
data [25], it is not clear how many features the dataset holds in total, though the combined
dataset called combined_IoT_dataset proposed by the original paper [85] uses a total of
22 features.
5.3. CIC-IDS2017
All of the CIC datasets are created by the Canadian Institute for Cybersecurity, some-
times collaborating with an external institution [27]. In the case of CIC-IDS2017 [89], it is
the first IDS dataset that the CIC created, back in 2017. The dataset is labeled, imbalanced,
and was generated based on the most common attacks in 2016. The researchers aimed to
create naturalistic benign background traffic and set out to mimic a real network traffic
Algorithms 2025, 18, 209 19 of 34
Paper Accuracy [%] Precision [%] Recall [%] F1 Score [%] Highest Accuracy ML Technique Dataset(s)
[61] 100 100 100 100 DT TON_IoT
[55] 100 100 100 100 RF TON_IoT
[43] 100 100 100 100 RF Edge-IIoT
[59] 100 100 100 100 DT CICIoT2023
[59] 100 100 100 100 RF CICIoT2023
[45] 99.9987 100 - 99.9993 XGBoost BoT-IoT
[74] 99.99 99.99 99.99 99.99 KNN, LR, DNN CIC2023 IoT
[78] 99.99 - - - JRip classifier BoT-IoT
[80] 99.98 99 89 - DT CSE-CIC-IDS2018
[33] 99.96 99.99 100 100 XGBoost CIC-IDS2017
[82] 99.96 99.96 99.96 99.96 RF BoT-IoT
[47] 99.95 99.66 99.61 99.63 RF Application-Layer DDoS Dataset
[44] 99.94 99.87 99.83 99.85 RF SNMP-MIB Dataset
[76] 99.92 - - - Stacking using XGBoost BoT-IoT
[67] 99.9 99.9 99.9 99.9 RF BoT-IoT
[10] 99.79 99.09 99.77 99.43 RF Edge-IIoTset
[71] 99.73 99.97 93.3 96.54 MLP CICIDS2017
[35] 98.17 97.63 98.08 97.90 EWEA TON_IoT
[72] 99.74 100 99 100 CNN, VGG19 CIC-DDoS2019
detection_of_IoT_botnet-
[40] 99.7 99.7 99.7 99.7 RF
_attacks_N_BaIoT
[36] 99.7 98.3 - 85.9 CNN IoTID20
Hybrid Deep Learning (LSTM + CIC DoS, CI-CIDS 2017,
[52] 99.51 99.6 99.52 99.51
DENS + GRU) CSE-CIC-IDS 2018
[57] 99.45 - - 99.52 RF UNSW-NB15, IoT23, TON_IoT
[53] 99.1 98.4 99.1 98.7 XGBoost TON_IoT
[28] 99 100 99 99.16 EWMA+CUSUM+KNN Bot-IoT
[63] 99 99 100 99 RF Bot-IoT
[58] 99 100 100 100 SVM TON_IoT
[64] 98.78 99.03 99.35 98.48 CNN + LSTM CISIDS2019
[46] 98.69 99 - 99 XGBoost CiCIoT2023
[77] 98.6 - 98.7 98 RF IoT-CIDDS
[86] 98.5 - - - SVM + Bagged Trees generated dataset
[68] 98.5 98.5 98.4 98.44 TabNet algorithm CIC-DDoS2019
[32] 98.2 - - - NB custom
[37] 98 100 98 99 SVM custom
[49] 97.39 - - - DT + RF + SVM CICDDoS2019
Stacking (DT, MLP RProp, Logistic
[75] 97.31 95.8 96.88 96.39 TON_IoT
Regression)
[29] 97.16 97.41 99.1 - CNN + LSTM CICIDS2017
[50] 97.06 97.31 97.02 97 RF MedBIoT
variational dynamic Bayesian
[54] 97 98 - 95.9 DARPA2000
algorithm+HMM
[51] 95.32 95.8 95.32 94.81 RF MedBIoT
[38] 95 95 95 94 GADAD-ET TON_IoT
K-means + Gaussian mixture +
[65] 94.5 93.3 95.3 94.3 CIC-DDoS2019
one-class SVM
[66] 88.73 89.92 88.73 88.53 APSO-CNN-SE UNSW-NB15
Paper Accuracy [%] Precision [%] Recall [%] F1 Score [%] Highest Accuracy ML Technique Dataset
[38] 100 100 - 100 GADAD-RF TON_IoT
[55] 100 100 100 100 RF TON_IoT
BoostedEnsML (LightGBM +
[69] 100 100 100 100 CSE-CICIDS2018
XGBoost)
[45] 99.985 99.996 - 99.997 RF BoT-IoT
Hybrid Deep Learning (LSTM +
[52] 99.97 99.98 99.97 99.98 BoT-IoT
DENS + GRU)
EnsembleVoting (RF DT ET CIC DoS, CI-CIDS 2017,
[76] 99.95 - - -
XGBoost) CSE-CIC-IDS 2018
[82] 99.95 99.95 99.95 99.95 RF BoT-IoT
[61] 99.9 99.9 99.9 99.9 DT TON_IoT
[67] 99.9 99.9 99.9 99.9 RF BoT-IoT
[81] 99.89 99.95 99.92 99.94 KNN IoT23
[30] 99.8 - - - RF BoT-IoT
[79] 99.7 - - - DP-model CIC-IDS2017
Algorithms 2025, 18, 209 21 of 34
Table 6. Cont.
Paper Accuracy [%] Precision [%] Recall [%] F1 Score [%] Highest Accuracy ML Technique Dataset
[62] 99.6 - - - MLP algorithm Bot-IoT
[63] 99 99 99 99 KNN Bot-IoT
[58] 99 99 99 99 LSTM TON_IoT
[39] 98.9 99.47 99.31 99.35 LSTM CIC-DDoS2019
[35] 98.72 97.81 97.35 98.26 EWEA Edge-IIoTset
[53] 98.5 98.2 95.9 97.4 KNN TON_IoT
[34] 98.1 - - - DT custom
[57] 97.81 - - 97.81 RF UNSW-NB15, IoT23, TON_IoT
[51] 97.66 98.24 97.66 96.57 RF MedBIoT
Voting (DT, MLP RProp, Logistic
[75] 96.32 93.12 84.55 88.63 TON_IoT
Regression)
[50] 96.17 96.92 96.17 96.02 RF MedBIoT
[70] 95.59 79 64 68 Extratree UNSW_NB15
[41] 94.21 - - - J48 Edge-IIoTset
[36] 86.1 - - 75.8 CCN IoTID20
[66] 78.35 81.79 78.35 77.65 APSO-CNN-SE UNSW-NB15
There were significant performance variations between various ML models. For binary
classification, RF, DT, and XGBoost were the overall best performers among other models.
On the contrary, for multiclass classification, the RF, K-Nearest Neighbors (KNN), and Long
Short Term Memory (LSTM) models performed better, suggesting that the flexibility and
robustness of the above methods were more suitable to deal with the increased complexity
of the multiclass issue. These findings verify the relevance of algorithmic selection to
maximize outcomes.
While the majority of studies emphasize accuracy as the primary measure, it is class
distribution-prone and can be misleading with high class imbalances in the datasets. In
response to these limitations, numerous studies have placed emphasis on measures such as
F1 score, which provides a balanced perspective with regard to both recall and precision.
This shift emphasizes the need for standard reporting practices since they enable fair
and meaningful comparisons among studies and permit the building of robust DDoS
detection methodologies.
It is hard to compare the time complexity of different machine learning techniques
across various datasets due to differences in the implementation, hardware, and nature of
the datasets. Some of the papers provided us with ADT (Average Detection Time) but most
did not. To address this, we chose to calculate the Average Validation Time (AVT)—the
time it took to run models on test datasets, grouped by particular datasets. Although AVT
is a useful rough estimate of model efficiency, it is by no means flawless. It does not account
for preprocessing steps or the specific feature sets used, which can prove to be of significant
impact. However, we believe that AVT is a handy metric for gaining insight into the relative
computational expense of different models on provided datasets.
often reflects an ideal scenario where distinguishing features are quite clear. However,
the controlled nature of the dataset might not capture the full complexity found in real-
world environments.
Table 7. Binary classification performance for BoT-IoT (sorted by accuracy); AVT: Average Valida-
tion Time.
Paper Accuracy [%] Precision [%] Recall [%] F1 Score [%] AVT [ms] Highest Accuracy ML Technique
[45] 99.9987 100 - 99.9993 0.0011 XGBoost
[78] 99.99 - - - - JRip classifier
[82] 99.96 99.96 99.96 99.96 - RF
[76] 99.92 - - - - Stacking using XGBoost
[67] 99.9 99.9 99.9 99.9 0.0011 RF
[40] 99.7 99.7 99.7 99.7 - RF
[28] 99 100 99 99.16 - EWMA + CUSUM + KNN
[63] 99 99 100 99 - RF
Table 8. Binary classification performance for TON_IoT (sorted by accuracy); AVT: Average Validation
Time, ADT: Average Detection Time.
Table 9. Binary classification performance for CIC-DDoS2019 (sorted by accuracy); AVT: Average
Validation Time.
Paper Accuracy [%] Precision [%] Recall [%] F1 Score [%] AVT [ms] Highest Accuracy ML Technique
[72] 99.74 100 99 100 37.02 CNN, VGG19
[64] 98.78 99.03 99.35 98.48 - CNN + LSTM
[68] 98.5 98.5 98.4 98.44 0.1234 TabNet algorithm
[49] 97.39 - - - - DT + RF + SVM
[65] 94.5 93.3 95.3 94.3 - K-means + Gaussian mixture+one-class SVM
The CIC-DDoS2019 dataset showed the worst accuracies and the widest performance
spread compared to the other two datasets. This variation could correspond to the complex-
ity of the DDoS attack patterns that are present in the dataset. Deep learning techniques that
include CNNs may underline the potential complexity of the dataset, where performance
could be improved when spatial or sequential representations of data are the basis for
such methodologies.
The general tendency in the performance of the studied models indicates that mod-
els based on neural networks require more time and impose higher computational over-
head [61], while XGBoost, DT, RF, and ET are faster. However, in the CIC-DDoS2019 dataset,
CNN-based models outperformed tree-based and SVM-based alternatives (Table 9).
Table 10. Multiclass classification performance for BoT-IoT (sorted by accuracy); AVT: Average
Validation Time, ADT: Average Detection Time.
Table 11. Multiclass classification performance for TON_IoT (sorted by accuracy); AVT: Average
Validation Time, ADT: Average Detection Time.
7. Discussion
7.1. Datasets
The reviewed studies reveal a strong preference for the BoT-IoT and TON_IoT datasets
due to their suitability for both binary and multiclass classification tasks. Both datasets
offer rich, labeled data and are gathered from real IoT/IIoT environments and are therefore
highly relevant for cybersecurity research. However, their significant class imbalances pose
challenges that require additional preprocessing or algorithmic strategies to ensure balanced
performance across classes. The BoT-IoT dataset, with its smaller number of attack classes,
is particularly popular, while the more diverse TON_IoT dataset provides opportunities to
evaluate model performance across a wider range of scenarios. Comparatively, datasets
like CIC-IDS2017 are also used, but their specificity to certain attack types and features
makes them less applicable in general for all IoT usage. The distribution of datasets among
the reviewed papers is summarized in Figure 1.
There is no significant difference in the popularity of datasets used for binary and
multiclass classification tasks. BoT-IoT remains the most popular dataset, followed very
closely by TON_IoT, because both datasets are eligible for these two purposes. Binary
classification—labeling data flows as benign or attack—appears to be tackled more often
(42 studies) than multiclass classification, which focuses on distinguishing between different
attack types (27 studies). The distribution of datasets employed for binary and multi-
classification comparisons is presented in Figure 3 and Figure 4, respectively.
7.4. Performance
Machine learning models have consistently demonstrated superb performance, with
median accuracy levels of approximately 99% on binary and multiclass tasks. This per-
formance is best illustrated using the BoT-IoT dataset, most likely due to it having fewer
classes and properly designed features, which make it highly trainable. Decision Tree
(DT) and Random Forest (RF) models tend to perform well, particularly in binary clas-
sification, where overfitting resistance is an asset. In multiclass scenarios, tree-based
ensemble techniques are also used very effectively, although their application differs across
datasets. However, the inconsistencies observed with datasets such as TON_IoT suggest
that dataset characteristics, including class distribution and feature diversity, significantly
impact model performance. Cross-validation across multiple datasets remains crucial to
ensuring robustness and the ability to adapt to different conditions.
7.5. Outlook
As this review has indicated, researchers suffer from a shortage of suitable data to base
their work on in this domain. Regarding datasets, researchers will continue to fill in the
gaps in industry-specific datasets as IoT devices continue to gain popularity. That is, as was
the case with the IIoT datasets, [83,87], and MedBIoT dataset [51] published in the past two
years, the research will be looking to target more specialized devices and network traffic,
rather than trying to encompass large general datasets. On the same note, more general
datasets will continue to be published, like the ones from the CIC, though they will focus
more on the common attacks or vulnerabilities identified in the most recent years. There is
no indication that the more recent datasets are gaining in complexity (neither in the number
of records, features, or devices captured); hence, this trend is likely to continue. This is
tied to the resource-constrained nature of research institutes’ current training, testing, and
deployment capabilities.
Algorithms 2025, 18, 209 27 of 34
9. Conclusions
This study explored more than 60 relevant papers, with the aim of providing a
one-of-a-kind replicable comprehensive PRISMA literature review on machine learning
techniques, deployment options, and datasets in recent papers on IDSs for DDoS attacks in
IoT networks. As one of the starting points, this study laid out the foundational knowledge
about the domain, including a summary of findings from previous literature reviews on
the topic. The next chapters explored details of IDS deployment, providing a clear view
of the many options researchers have used in their studies and highlighting issues with
resource-heavy infrastructure choices. Similarly, the datasets used were listed, with the
most popular ones described in full detail, aiding in the analysis of the performance results
of different machine learning algorithms. For the machine learning chapter, both binary
and multiclass classification were analyzed, and a comparative study on the performance
of the algorithms was conducted.
This literature review discussed the findings, common trends, and important insights
in Section 7, which provides the reader with a comprehensive overview of this paper’s
answers to the posed research questions. This chapter ends with an outlook on the expected
trends in this research domain, which could be used by future researchers to conduct
further studies and fill gaps in the current knowledge.
Author Contributions: Conceptualization, M.B.B., S.D., M.K., M.B.L., M.P., G.C. and N.D.; method-
ology, M.B.B., S.D., M.K., M.B.L., M.P., G.C. and N.D.; validation, M.B.B., S.D., M.K. and M.B.L.;
investigation, M.B.B., S.D., M.K. and M.B.L.; resources, M.B.B., S.D., M.K. and M.B.L.; data curation,
M.B.B., S.D., M.K. and M.B.L.; writing—original draft preparation, M.B.B., S.D., M.K., M.B.L., M.P.,
G.C. and N.D.; writing—review and editing, M.P., G.C. and N.D.; visualization, M.B.B., S.D., M.K.,
M.B.L., M.P., G.C. and N.D.; supervision, M.P., G.C. and N.D.; project administration, M.P., G.C.
and N.D.; funding acquisition, N.D. All authors have read and agreed to the published version of
the manuscript.
Appendix A
Table A1. Studies and their ML training systems.
Paper ML Training HW + SW
HP notebook with Windows 10 Pro Enterprise 64-bit, an Intel(R) Core(TM) i7-5500 CPU with two cores and four logical
[61]
processors, 16 GB of RAM, and 14.6 GB of virtual memory. Used the PyCharm 2022.2 and Python 3.10
Intel(R) Core (TM) i7-9750H CPU @ 2.60 GHz, 2592 Mhz, six core(s), twelve logical processor(s), 16 GB RAM, and NVIDIA
[55]
GeForce GTX 1660 Ti with Max-Q Design 4 GB
[62] HP computer with CPU (2.50GHz Intel(R) Core (TM) i7-6500U), 8 GB RAM, and Windows10
[28] Windows 10, 16 GB RAM Intel® Core ™ i7-8650U CPU at 2.11 GHz, Jupyter Notebook Scikit-learn ML
[63] No specs, Python
[64] Keras/Tensorflow on NVIDIA Tesla VIOO GPUs, 16 GB VRAM with 256 GB on 10 nodes in HPC
[65] On High-Performance Computer (HPC) facility available at the University of Huddersfield, UK
[42] No specs
[66] Windows 10, Intel(R) Core(TM) i7-10700K CPU Main frequency 3.80 GHz, RAM 32 GB, Python3.8 torch1.8.0
[67] DELL (inspiron13 5000) Laptop, Windows 10, Intel(R)Core(TM)i5-8250U CPU @ 1.60GHz,1.80 GHz.8.00 GB RAM
[68] No specs
Intel(R) Core(TM) i7-7700 CPU @ 3.60 GHz, 3600 Mhz, 4 Core(s), 16 GB (15.9 GB usable), Windows 10, NVIDIA GeForce
[69]
GTX 1050 Ti GPU.
[71] Intel Core i7 processor (3.6GHz Quad-core), 1TB of hard disk storage, 32GB of RAM, Windows 11, Python v3.6
[72] HP laptop with a 2.9 GHz Intel Core i7-7500U CPU, 8GB RAM, Python
[73] No specs
64-bit Intel Core-i7 CPU with 16 GB RAM in Windows 7. Tensorflow for deep learning, machine learning algorithm as
[29]
implemented in MATLAB 2017a
[74] No specs, Rust program
[59] 64-bit ARM CPU, Sci-kit-learn using Python 3.9
[75] 8th gen Intel Core i7 CPU, 32 GB RAM, NVIDIA Quadro M2000M GPU
[56] No specs
[76] Google Colab
[57] Local desktop computer (64-bit, 16 GB RAM, Core I7), Java (JDK) 11, Hadoop 2.7, Spark v3.0, and Pyspark 3.0
Waikato Information Research Environment (Weka 3.8.3), 32 GB RAM workstation with Intel Xeon CPU E3-1271 v3 @ 3.60
[78]
GHz CPU, Scikit-learn library in Python
12 processors, six kernels, RAM 32 GB 64-b Windows 10. Each processor is configured with Intel Core i7-8750H CPU
[39]
@2.20GHz, 2201 MHz
[60] No specs
[79] No specs
[30] Intel Xeon E5-2650v4 2xCPU, 256 GB RAM, CentOS Linux 7, Python 3.9.6
[80] 64-bit Windows 10
[81] No specs
[51] No specs
[82] MacBook Pro, Apple M1 Chip, 16 GB RAM
Paper ML Training HW + SW
[86] Asus notebook, Kali Linux 2020.4, 8GB of primary memory and core i5 CPU
[43] No specs
PHP 5.3.13 on Intel Core I7 CPU at 2.40 GHz, 2 GB RAM, Windows 10. Apache Server version 2.2.22 to implement servers,
[40]
MYSQL version 5.5.24
[77] No specs
[41] No specs
[45] Tyrone PC run by Intel(R) Xeon(R) Silver 4114 CPU @ 2.20 GHz (2 processors), 128 GB RAM and 2 TB hard disk.
[46] Windows, CPU model i7-13700K @ 3.40 GHz with 32 GB memory, GPU NVIDIA GeForce® RTX4070Ti with 12 GB memory
[47] No specs
[48] Simulated using Python 3.6.5, on PC i5-8600k, 250GBSSD, GeForce 1050Ti 4GB, 16GB RAM, and 1TBHDD
Algorithms 2025, 18, 209 30 of 34
Paper ML Training HW + SW
[52] Intel Core i5 8th generation laptop, Python 3.0 simulation
[53] Python 3.8, Windows 10 Core i7, 16 GB RAM.
[49] Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz, 16 GB RAM Ubuntu 18.04 LTS
[58] No specs
[50] No specs
[38] Python 3.9, Windows 10, Intel Core i7 CPU, 16 GB RAM
Austrian Centre for Cyber Security’s (ACCS) Cyber Range Lab employs the IXIA Perfect Storm technology to create a
[70]
hybrid model of everyday activities
[32] No specs
[10] Ubuntu server 20.04 LTS virtual machine on Intel core i51135G7 processor, 12 GB of RAM and a Microsoft Windows 10 host
[36] Ubuntu on Raspberry Pi 3
[31] No specs
[33] No specs
[35] Intel Core i7-1355U CPU, 12 GB RAM, a virtual machine operating Ubuntu 20.04.6 LTS
[37] No specs
[34] Ubuntu v16.0.2, Intel® Core™ i7-3540M 3.00 GHz CPU, 4.0 GB RAM.
[44] No specs, simulation
Built-at-home model, ARRIS TM822A modem, a NETGEAR R6300v2 distant switch, a TPLink AC1750 twofold far-off
[54]
switch, a NETGEAR ProSAFE Plus GS105Ev2 switch
References
1. Sinha, S. State of IoT 2024: Number of Connected IoT Devices Growing 13 18.8 Billion Globally. 2024. Available online:
https://iot-analytics.com/reports-databases/ (accessed on 30 November 2024).
2. Marr, B. 2024 IoT and Smart Device Trends: What You Need to Know for the Future. Forbes, 19 October 2023.
3. Executive, P. Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Website. Available online:
https://www.prisma-statement.org/ (accessed on 30 November 2024).
4. Executive, P. Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Flow Diagram. Available online:
https://www.prisma-statement.org/prisma-2020-flow-diagram (accessed on 30 November 2024).
5. Executive, P. Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Checklist. Available online:
https://www.prisma-statement.org/prisma-2020-checklist (accessed on 30 November 2024).
6. DTU FindIt Database. Available online: https://findit.dtu.dk/ (accessed on 30 November 2024).
7. DTU FindIt Data Providers. Available online: https://findit.dtu.dk/en/about/providers/ (accessed on 30 November 2024).
8. Desbiens, F. What Is IoT? In Building Enterprise IoT Solutions with Eclipse IoT Technologies; Apress: New York, NY, USA, 2023;
pp. 3–23. [CrossRef]
9. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020,
10, 4102. [CrossRef]
10. Khedr, W.I.; Gouda, A.E.; Mohamed, E.R. FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using
Machine Learning for Stateful SDN-Based IoT Networks. IEEE Access 2023, 11, 28934–28954. [CrossRef]
11. Mothukuri, V.; Khare, P.; Parizi, R.M.; Pouriyeh, S.; Dehghantanha, A.; Srivastava, G. Federated-Learning-Based Anomaly
Detection for IoT Security Attacks. IEEE Internet Things J. 2022, 9, 2545–2554. [CrossRef]
12. IEEE Xplore. IEEE Xplore Digital Library. 2024. Available online: https://ieeexplore.ieee.org/Xplore/home.jsp (accessed on 30
November 2024).
13. Dulhare, U.N.; Ahmad, K.; Ahmad, K.A.B. What is Machine Learning? In Machine Learning and Big Data: Concepts, Algorithms,
Tools, and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2020.
14. Zhang, J.; Li, F.; Ye, F. An ensemble-based network intrusion detection scheme with bayesian deep learning. In Proceedings of
the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6.
15. Duke, D. What is the difference between Denial-of-Service (DoS) and Distributed-Denial-of-Service (DDoS)? Netw. Secur. 2002,
2002, 4. [CrossRef]
16. Nazario, J. DDoS attack evolution. Netw. Secur. 2008, 2008, 7–10. [CrossRef]
17. Lee, N. Intrusion Detection System. In Encyclopedia of Computer Graphics and Games; Springer International Publishing: Cham,
Switzerland, 2024; p. 1008. [CrossRef]
Algorithms 2025, 18, 209 31 of 34
18. Dutta, N.; Jadav, N.; Tanwar, S.; Sarma, H.K.D.; Pricop, E. Intrusion Detection Systems Fundamentals. In Cyber Security: Issues and
Current Trends; Springer: Singapore, 2022; pp. 101–127. [CrossRef]
19. Rafique, S.H.; Abdallah, A.; Musa, N.S.; Murugan, T. Machine Learning and Deep Learning Techniques for Internet of Things
Network Anomaly Detection—Current Research Trends. Sensors 2024, 24, 1968. [CrossRef] [PubMed]
20. Mishra, N.; Pandya, S. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions:
A Systematic Review. IEEE Access 2021, 9, 59353–59377. [CrossRef]
21. Zaman, S.; Tauqeer, H.; Ahmad, W.; Shah, S.M.A.; Ilyas, M. Implementation of Intrusion Detection System in the Internet of
Things: A Survey. In Proceedings of the 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan,
5–7 November 2020; pp. 1–6. [CrossRef]
22. Abinaya, M.; Prabakeran, S.; Kalpana, M. Comparative Evaluation on Various Machine Learning Strategies Based on Identification
of DDoS Attacks in IoT Environment. In Proceedings of the 2023 9th International Conference on Advanced Computing and
Communication Systems (ICACCS), Coimbatore, India, 17–18 March 2023; Volume 1, pp. 1814–1821. [CrossRef]
23. Vivek, V.; Veeravalli, B. A Survey on Machine Learning Approaches for Intrusion Detection in Cloud Computing Environments
for Improving Routing Payload Security and Network Privacy. In Proceedings of the 2024 IEEE International Conference on
Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), Bali, Indonesia, 4–6 July 2024; pp. 79–85. [CrossRef]
24. Walling, S.; Lodh, S. A Survey on Intrusion Detection Systems: Types, Datasets, Machine Learning methods for NIDS and Chal-
lenges. In Proceedings of the 2022 13th International Conference on Computing Communication and Networking Technologies
(ICCCNT), Kharagpur, India, 3–5 October 2022; pp. 1–7. [CrossRef]
25. Moustafa, N. The TON_IoT Datasets. 2021. Available online: https://research.unsw.edu.au/projects/toniot-datasets
(accessed on 30 November 2024).
26. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of
Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [CrossRef]
27. Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. CICIDS2017 Dataset. 2018. Available online: https://www.unb.ca/cic/datasets/
ids-2017.html (accessed on 30 November 2024).
28. Alzahrani, R.; Alzahrani, A. A Novel Multi Algorithm Approach to Identify Network Anomalies in the IoT Using Fog Computing
and a Model to Distinguish between IoT and Non-IoT Devices. J. Sens. Actuator Netw. 2023, 12, 19. [CrossRef]
29. Roopak, M.; Yun Tian, G.; Chambers, J. Deep Learning Models for Cyber Security in IoT Networks. In Proceedings of the 2019
IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019;
pp. 452–457. [CrossRef]
30. Katsura, Y.; Endo, A.; Kakiuchi, M.; Arai, I.; Fujikawa, K. Lightweight Intrusion Detection Using Multiple Entropies of Traffic
Behavior in IoT Networks. In Proceedings of the 2022 IEEE Global Conference on Artificial Intelligence and Internet of Things
(GCAIoT), Alamein New City, Egypt, 18–21 December 2022; pp. 138–145. [CrossRef]
31. Kumar, J.; Arul Leena Rose, P.J. Mitigate Volumetric DDoS Attack using Machine Learning Algorithm in SDN based IoT Network
Environment. Int. J. Adv. Comput. Sci. Appl. 2023, 14. [CrossRef]
32. Jyothsna, V. Defending Against IoT Threats: A Comprehensive Framework with Advanced Models and Real-Time Threat
Intelligence for DDoS Detection. In Proceedings of the 2024 2nd International Conference on Networking and Communications
(ICNWC), Chennai, India, 2–4 April 2024; pp. 1–7. [CrossRef]
33. Ferrão, T.; Manene, F.; Ajibesin, A.A. Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network.
Comput. Mater. Contin. 2023, 75, 4985–5007. [CrossRef]
34. Bhayo, J.; Shah, S.A.; Hameed, S.; Ahmed, A.; Nasir, J.; Draheim, D. Towards a machine learning-based framework for DDOS
attack detection in software-defined IoT (SD-IoT) networks. Eng. Appl. Artif. Intell. 2023, 123, 106432. [CrossRef]
35. Toony, A.A.; Alqahtani, F.; Alginahi, Y.; Said, W. MULTI-BLOCK: A novel ML-based intrusion detection framework for
SDN-enabled IoT networks using new pyramidal structure. Internet Things 2024, 26, 101231. [CrossRef]
36. Tawfik, M.; Al-Zidi, N.M.; Alsellami, B.; Al-Hejri, A.M.; Nimbhore, S. Internet of Things-Based Middleware Against Cyber-
Attacks on Smart Homes using Software-Defined Networking and Deep Learning. In Proceedings of the 2021 2nd International
Conference on Computational Methods in Science & Technology (ICCMST), Mohali, India, 17–18 December 2021; pp. 7–13.
[CrossRef]
37. Mazhar, N.; Saleh, R.; Zaba, R.; Zeeshan, M.; Hameed, M.M.; Khan, N. R-IDPS: Real Time SDN-Based IDPS System for IoT
Security. Comput. Mater. Contin. 2022, 73, 3099–3118. [CrossRef]
38. Saiyed, M.; Al Anbagi, I. A Genetic Algorithm- and t-Test-based system for DDoS Attack Detection in IoT Networks. IEEE Access
2024, 12, 25623–25641. [CrossRef]
39. Jia, Y.; Zhong, F.; Alrawais, A.; Gong, B.; Cheng, X. FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS
Attacks. IEEE Internet Things J. 2020, 7, 9552–9562. [CrossRef]
Algorithms 2025, 18, 209 32 of 34
40. Hikal, N.A.; Elgayar, M.M. Enhancing IoT Botnets Attack Detection Using Machine Learning-IDS and Ensemble Data Preprocess-
ing Technique. In Proceedings of the Internet of Things—Applications and Future, Agartala, Tripura, India, 3–4 February 2020;
Ghalwash, A.Z., El Khameesy, N., Magdi, D.A., Joshi, A., Eds.; Springer: Singapore, 2020; pp. 89–102.
41. Haque, S.; El-Moussa, F.; Komninos, N.; Muttukrishnan, R. Identification of Important Features at Different IoT layers for
Dynamic Attack Detection. In Proceedings of the 2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity),
IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and
Security (IDS), New York, NY, USA, 6–8 May 2023; pp. 84–90. [CrossRef]
42. Alghanmi, N.; Alotaibi, R.; Buhari, S.M. Anomaly Detection in IoT Networks: Machine Learning Approaches for Intrusion
Detection. Wirel. Pers. Commun. 2022, 122, 2309–2324. [CrossRef]
43. Fikriansyah, M.I.; Amatullah Karimah, S.; Setiadi, F. Detection of DDOS Attacks in IIoT Case Using Machine Learning Algorithms.
In Proceedings of the 2024 International Conference on Data Science and Its Applications (ICoDSA), Kuta, Bali, Indonesia,
10–11 July 2024; pp. 117–121. [CrossRef]
44. Mishra, S.; Albarakati, A.; Sharma, S.K. Cyber Threat Intelligence for IoT Using Machine Learning. Processes 2022, 10, 2673.
[CrossRef]
45. Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Garg, S.; Hassan, M.M. A distributed intrusion detection system to detect DDoS
attacks in blockchain-enabled IoT network. J. Parallel Distrib. Comput. 2022, 164, 55–68. [CrossRef]
46. Hızal, S.; Akhter, A.S.; Çavuşoğlu, Ü.; Akgün, D. Blockchain-based IoT security solutions for IDS research centers. Internet Things
2024, 27, 101307. [CrossRef]
47. Ibrahim El Sayed, A.; Abdelaziz, M.; Hussein, M.; Elbayoumy, A.D. DDoS Mitigation in IoT Using Machine Learning and
Blockchain Integration. IEEE Netw. Lett. 2024, 6, 152–155. [CrossRef]
48. Alrayes, F.S.; Aljebreen, M.; Alghamdi, M.; Alrslani, F.A.F.; Alshuhail, A.; Almukadi, W.S.; Basheti, I.; Sharif, M.M. Harnessing
blockchain with ensemble deep learning-based distributed dos attack detection in iot-assisted secure consumer electronics
systems. Fractals 2024, 32, 09n10. [CrossRef]
49. Babu, E.S.; BKN, S.; Nayak, S.R.; Verma, A.; Alqahtani, F.; Tolba, A.; Mukherjee, A. Blockchain-based Intrusion Detection System
of IoT urban data with device authentication against DDoS attacks. Comput. Electr. Eng. 2022, 103, 108287. [CrossRef]
50. Guerra-Manzanares, A.; Medina-Galindo, J.; Bahsi, H.; Nõmm, S. Using MedBIoT Dataset to Build Effective Machine Learning-
Based IoT Botnet Detection Systems. In Proceedings of the Information Systems Security and Privacy, Online, 9–11 February
2022; Furnell, S., Mori, P., Weippl, E., Camp, O., Eds.; Springer: Cham, Swizterland, 2022; pp. 222–243.
51. Guerra-Manzanares, A.; Medina-Galindo, J.; Bahsi, H.; Nõmm, S. MedBIoT: Generation of an IoT Botnet Dataset in a Medium-
sized IoT Network. In Proceedings of the 6th International Conference on Information Systems Security and Privacy—ICISSP,
INSTICC, Valletta, Malta, 25–27 February 2020; SciTePress: Setúbal, Portugal, 2020; pp. 207–218. [CrossRef]
52. Ullah, S.; Khan, M.A.; Ahmad, J.; Jamal, S.S.; e Huma, Z.; Hassan, M.T.; Pitropakis, N.; Arshad.; Buchanan, W.J. HDL-IDS: A
Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors 2022, 22, 1340. [CrossRef]
53. Gad, A.R.; Nashat, A.A.; Barkat, T.M. Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based
on ToN-IoT Dataset. IEEE Access 2021, 9, 142206–142217. [CrossRef]
54. Kalnoor, G.; Gowrishankar, S. A model for intrusion detection system using hidden Markov and variational Bayesian model for
IoT based wireless sensor network. Int. J. Inf. Technol. 2022, 14, 2021–2033. [CrossRef]
55. Sadhwani, S.; Manibalan, B.; Muthalagu, R.; Pawar, P. A Lightweight Model for DDoS Attack Detection Using Machine Learning
Techniques. Appl. Sci. 2023, 13, 9937. [CrossRef]
56. Chandana Swathi, G.; Kishor Kumar, G.; Siva Kumar, A. Ensemble classification to predict botnet and its impact on IoT networks.
Meas. Sens. 2024, 33, 101130. [CrossRef]
57. Alghamdi, R.; Bellaiche, M. Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT. IoT 2022,
3, 285–314. [CrossRef]
58. Khanday, S.A.; Fatima, H.; Rakesh, N. Implementation of intrusion detection model for DDoS attacks in Lightweight IoT
Networks. Expert Syst. Appl. 2023, 215, 119330. [CrossRef]
59. Thereza, N.; Ramli, K. Development of Intrusion Detection Models for IoT Networks Utilizing CICIoT2023 Dataset. In Proceedings
of the 2023 3rd International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS), Bali,
Indonesia, 6–8 December 2023; pp. 66–72. [CrossRef]
60. Khan, A.; Sharma, I. Guardians of the IoT: A Symphony of Ensemble Learning for DDoS Attack Resilience. In Proceedings of the
2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM), Dubai, United Arab
Emirates, 12–13 December 2023; pp. 1–6. [CrossRef]
61. Ayad, A.G.; Sakr, N.A.; Hikal, N.A. A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT
networks. J. Supercomput. 2024, 80, 26942–26984. [CrossRef]
62. Rbah, Y.; Mahfoudi, M.; Balboul, Y.; Chetioui, K.; Fattah, M.; Mazer, S.; Elbekkali, M.; Bernoussi, B. A machine learning based
intrusions detection for IoT botnet attacks. AIP Conf. Proc. 2023, 2814, 030012. [CrossRef]
Algorithms 2025, 18, 209 33 of 34
63. Churcher, A.; Ullah, R.; Ahmad, J.; ur Rehman, S.; Masood, F.; Gogate, M.; Alqahtani, F.; Nour, B.; Buchanan, W.J. An Experimental
Analysis of Attack Classification Using Machine Learning in IoT Networks. Sensors 2021, 21, 446. [CrossRef]
64. Roopak, M.; Tian, G.Y.; Chambers, J. An Intrusion Detection System Against DDoS Attacks in IoT Networks. In Proceedings of
the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January
2020; pp. 0562–0567. [CrossRef]
65. Roopak, M.; Parkinson, S.; Tian, G.Y.; Ran, Y.; Khan, S.; Chandrasekaran, B. An unsupervised approach for the detection of
zero-day distributed denial of service attacks in Internet of Things networks. IET Netw. 2024, 13, 513–527. [CrossRef]
66. Ban, Y.; Zhang, D.; He, Q.; Shen, Q. APSO-CNN-SE: An Adaptive Convolutional Neural Network Approach for IoT Intrusion
Detection. Comput. Mater. Contin. 2024, 81, 567–601. [CrossRef]
67. Tyagi, H.; Kumar, R. Attack and anomaly detection in IoT networks using supervised machine learning approaches. Rev.
D’Intelligence Artif. 2021, 35, 11–21. [CrossRef]
68. Zegarra Rodríguez, D.; Daniel Okey, O.; Maidin, S.S.; Umoren Udo, E.; Kleinschmidt, J.H. Attentive transformer deep learning
algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection. PLoS ONE 2023, 18, 286652.
[CrossRef]
69. Okey, O.D.; Maidin, S.S.; Adasme, P.; Lopes Rosa, R.; Saadi, M.; Carrillo Melgarejo, D.; Zegarra Rodríguez, D. BoostedEnML:
Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning. Sensors 2022, 22, 7409.
[CrossRef] [PubMed]
70. Vijayalakshmi, M.; Susmanth Srinivas, A.; Ramanathan, S. Building a Smarter Shield: Using Ensemble Learning for Multi-Class
DDoS Attacks. In Proceedings of the 2024 15th International Conference on Computing Communication and Networking
Technologies (ICCCNT), Kamand, India, 24–28 June 2024; pp. 1–6. [CrossRef]
71. Chukwukelu, G.; Essien, A.; Salami, A.; Utuk, E. Comparative Analysis of Machine Learning Techniques for DDoS Intrusion
Detection in IoT Environments. In Proceedings of the 21st International Conference on Smart Business Technologies—ICSBT,
INSTICC, Dijon, France, 9–11 July 2024; SciTePress: Setúbal, Portugal, 2024; pp. 19–27. [CrossRef]
72. Gebrye, H.; Wang, Y.; Li, F. Computer vision based distributed denial of service attack detection for resource-limited devices.
Comput. Electr. Eng. 2024, 120, 109716. [CrossRef]
73. Alabsi, B.A.; Anbar, M.; Rihan, S.D.A. Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting
Ddos and Dos Attacks on the Internet of Things Networks. Sensors 2023, 23, 5644. [CrossRef]
74. Berqia, A.; Bouijij, H.; Merimi, A.; Ouaggane, A. Detecting DDoS Attacks using Machine Learning in IoT Environment. In
Proceedings of the 2024 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, 8–10 May
2024; pp. 1–8. [CrossRef]
75. Hajla, S.E.; Ennaji, E.M.; Maleh, Y.; Mounir, S. Enhancing IoT network defense: Advanced intrusion detection via ensemble
learning techniques. Indones. J. Electr. Eng. Comput. Sci. 2024, 35, 2010–2020. [CrossRef]
76. Mante, J.; Kolhe, K. Ensemble of tree classifiers for improved DDoS attack detection in the Internet of Things. Math. Model. Eng.
Probl. 2024, 11, 2355–2367. [CrossRef]
77. Kamaldeep; Malik, M.; Dutta, M. Feature Engineering and Machine Learning Framework for DDoS Attack Detection in the
Standardized Internet of Things. IEEE Internet Things J. 2023, 10, 8658–8669. [CrossRef]
78. Nimbalkar, P.; Kshirsagar, D. Feature selection for intrusion detection system in Internet-of-Things (IoT). ICT Express 2021,
7, 177–181. [CrossRef]
79. Morshedi, R.; Matinkhah, S.M.; Sadeghi, M.T. Intrusion Detection for IoT Network Security with Deep learning. J. AI Data Min.
2024, 12, 37–55. [CrossRef]
80. Ullah, S.; Mahmood, Z.; Ali, N.; Ahmad, T.; Buriro, A. Machine Learning-Based Dynamic Attribute Selection Technique for DDoS
Attack Classification in IoT Networks. Computers 2023, 12, 115. [CrossRef]
81. Pham, V.T.; Nguyen, H.L.; Le, H.C.; Nguyen, M.T. Machine Learning-based Intrusion Detection System for DDoS Attack in the
Internet of Things. In Proceedings of the 2023 International Conference on System Science and Engineering (ICSSE), Ho Chi
Minh, Vietnam, 27–28 July 2023; pp. 375–380. [CrossRef]
82. Almaraz-Rivera, J.G.; Perez-Diaz, J.A.; Cantoral-Ceballos, J.A. Transport and Application Layer DDoS Attacks Detection to IoT
Devices by Using Machine Learning and Deep Learning Models. Sensors 2022, 22, 3367. [CrossRef] [PubMed]
83. Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A New Comprehensive Realistic Cyber Security
Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access 2022, 10, 40277–40288. [CrossRef]
84. Poisson, M.; Carnier, R.; Fukuda, K. GothX: A generator of customizable, legitimate and malicious IoT network traffic. In
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, CSET ’24, Philadelphia, PA, USA, 13 August 2024;
pp. 65–73. [CrossRef]
85. Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and
IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 2020, 8, 165130–165150. [CrossRef]
Algorithms 2025, 18, 209 34 of 34
86. Binu, P.K.; Kiran, M. Attack and Anomaly Prediction in IoT Networks using Machine Learning Approaches. In Proceedings of
the 2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), Erode, India,
15–17 September 2021; pp. 1–6. [CrossRef]
87. Al-Hawawreh, M.; Sitnikova, E.; Aboutorab, N. X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for
Industrial Internet of Things. IEEE Internet Things J. 2022, 9, 3962–3977. [CrossRef]
88. KDD Cup 1999 Data. 1999. Available online: https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 12
December 2024).
89. Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic
Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP).
SCITEPRESS, Madeira, Portugal, 22–24 January 2018; pp. 108–116. [CrossRef]
90. Peterson, J.M.; Leevy, J.L.; Khoshgoftaar, T.M. A Review and Analysis of the Bot-IoT Dataset. In Proceedings of the 2021 IEEE
International Conference on Service-Oriented System Engineering SOSE, Oxford, UK, 23–26 August 2021; pp. 20–27.
91. Atuhurra, J.; Hara, T.; Zhang, Y.; Sasabe, M.; Kasahara, S. Dealing with Imbalanced Classes in Bot-IoT Dataset. arXiv 2024,
arXiv:2403.18989.
92. Laboratory, M.L. 2000 DARPA Intrusion Detection Scenario Specific Datasets. 2000. Available online: https://archive.ll.mit.edu/
ideval/data/2000data.html (accessed on 12 December 2024).
93. Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009
IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009;
pp. 1–6. [CrossRef]
94. Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A.A. Toward developing a systematic approach to generate benchmark datasets
for intrusion detection. Comput. Secur. 2012, 31, 357–374. [CrossRef]
95. García, S.; Grill, M.; Stiborek, J.; Zunino, A. An empirical comparison of botnet detection methods. Comput. Secur. 2014,
45, 100–123. [CrossRef]
96. Moustafa, N.; Slay, J. The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and
the comparison with the KDD99 data set. Inf. Secur. J. Glob. Perspect. 2016, 25, 18–31. [CrossRef]
97. Alkasassbeh, M.; Al-Naymat, G.; Hawari, E. Towards Generating Realistic SNMP-MIB Dataset for Network Anomaly Detection.
Int. J. Comput. Sci. Inf. Secur. 2016, 14, 1162–1185.
98. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Breitenbacher, D.; Shabtai, A.; Elovici, Y. N-BaIoT: Network-Based Detection of
IoT Botnet Attacks Using Deep Autoencoders. 2018. Available online: https://archive.ics.uci.edu/dataset/442/detection+of+
iot+botnet+attacks+n+baiot (accessed on 20 December 2024).
99. Mirsky, Y.; Doitshman, T.; Elovici, Y.; Shabtai, A. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
arXiv 2018, arXiv:1802.09089.
100. AWS. Canadian Institute for Cybersecurity CSE-CIC-IDS2018 Dataset. 2018. Available online: https://registry.opendata.aws/
cse-cic-ids2018/ (accessed on 12 December 2024).
101. Aubet, F.; Pahl, M. DS2OS Traffic Traces. 2018. Available online: https://www.kaggle.com/datasets/francoisxa/ds2ostraffictraces
(accessed on 12 December 2024).
102. Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. CIC-DDoS2019 Dataset. 2019. Available online: https://www.unb.ca/cic/
datasets/ddos-2019.html (accessed on 12 December 2024).
103. Garcia, S.; Parmisano, A.; Erquiaga, M.J. IoT-23: A labeled dataset with malicious and benign IoT network traffic. Zenodo 2020.
[CrossRef]
104. Ullah, I.; Mahmoud, Q.H. A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In Proceedings
of the Advances in Artificial Intelligence, Canberra, ACT, Australia, 29–30 November 2020; Goutte, C., Zhu, X., Eds.; Springer
International Publishing: Berlin/Heidelberg, Germany, 2020; pp. 508–520.
105. Ward, A.; Cordero, S. Application Layer DDoS Dataset. 2020. Available online: https://www.kaggle.com/datasets/wardac/
applicationlayer-ddos-dataset (accessed on 12 December 2024).
106. Jovanović, D.; Vuletić, P. ETF IoT Botnet Dataset. Mendeley Data 2021. [CrossRef]
107. Neto, E.; Dadkhah, S.; Ferreira, R.; Zohourian, A.; Lu, R.; Ghorbani, A. CICIoT2023: A real-time dataset and benchmark for
large-scale attacks in IoT environment. Sensors 2023, 23, 5941. [CrossRef]
108. Abdulrahman, A.; Ibrahem, M.K. Toward Constructing a Balanced Intrusion Detection Dataset Based on CICIDS2017. Samarra J.
Pure Appl. Sci. 2020, 2, 132–142.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.