Futureinternet 15 00076 v3
Futureinternet 15 00076 v3
Article
Effective and Efficient DDoS Attack Detection Using Deep
Learning Algorithm, Multi-Layer Perceptron
Sheeraz Ahmed 1 , Zahoor Ali Khan 2 , Syed Muhammad Mohsin 3,4, * , Shahid Latif 1 , Sheraz Aslam 5,6, * ,
Hana Mujlid 7 , Muhammad Adil 1 and Zeeshan Najam 8
Abstract: Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and
government agencies. They harm internet businesses, limit access to information and services, and
damage corporate brands. Attackers use application layer DDoS attacks that are not easily detectable
because of impersonating authentic users. In this study, we address novel application layer DDoS
attacks by analyzing the characteristics of incoming packets, including the size of HTTP frame packets,
the number of Internet Protocol (IP) addresses sent, constant mappings of ports, and the number of IP
addresses using proxy IP. We analyzed client behavior in public attacks using standard datasets, the
CTU-13 dataset, real weblogs (dataset) from our organization, and experimentally created datasets
from DDoS attack tools: Slow Lairs, Hulk, Golden Eyes, and Xerex. A multilayer perceptron (MLP),
a deep learning algorithm, is used to evaluate the effectiveness of metrics-based attack detection.
Citation: Ahmed, S.; Khan, Z.A.; Simulation results show that the proposed MLP classification algorithm has an efficiency of 98.99%
Mohsin, S.M.; Latif, S.; Aslam, S.; in detecting DDoS attacks. The performance of our proposed technique provided the lowest value
Mujlid, H.; Adil, M.; Najam, Z. of false positives of 2.11% compared to conventional classifiers, i.e., Naïve Bayes, Decision Stump,
Effective and Efficient DDoS Attack Logistic Model Tree, Naïve Bayes Updateable, Naïve Bayes Multinomial Text, AdaBoostM1, Attribute
Detection Using Deep Learning
Selected Classifier, Iterative Classifier, and OneR.
Algorithm, Multi-Layer Perceptron.
Future Internet 2023, 15, 76. https://
Keywords: DDoS attack; attack; attack detection; botnet; MLP classifier
doi.org/10.3390/fi15020076
of how effective these attacks can be; the bank’s own computers were used to transfer
large sums of money. No business is safe, no matter how large. Statistics show that 20% of
affected businesses fall into the small business category, 33% into the SME category, and
41% into the large business category. The more widespread the threat, the more important
it becomes to be aware of the issues and protect the important information. Eighty-two
percent of organizations have been exposed to at least one or more attacks in which data
are stolen and used to cripple the victim’s services. The organizations that were affected by
DDoS attacks reported a 26% drop in performance of their services and 41% reported an
outage of the affected services [3]. Figure 1 shows an environment of DDoS attacks.
The attacker makes precise imitations of human users’ behaviors in an effort to avoid
being noticed while conducting the assault. To launch an HTTP-GET flood DDoS assault,
the malicious user separates his attack techniques based on rate, admission pattern, etc. Sev-
eral significant concerns and challenges that have surfaced from recent research have drawn
increasing attention in the area of HTTP-GET flood DDoS assault detection. When work-
ing in the vicinity of conflicting HTTP-GET flood DDoS attacks [1], numerous challenges
arise, that are also only partially addressed or unresolved. DDoS attacks are disciplined,
distributed, and remotely organized networks that use deployed computers (also called
Bots or Zombies) to send an immense number of uninterrupted and synchronous requests
to the victim system(s). DDoS attacks are increasing in strength, regularity, and complexity.
Malicious users are constantly evolving their experience, adapting their techniques,
and using advanced technologies to launch various DDoS attacks. While there are various
solutions to detect, defend against, or mitigate DDoS attacks, malicious users continue
to develop new approaches and means to circumvent these countermeasures [3]. DDoS
events are still among the biggest threats to the network. Recently, DDoS outbreaks at the
application layer of internet servers have become widespread, resulting in huge revenue
losses for targets [4]. In TCP/IP layer attacks, the online server is crushed and the number
of requests per second is limited. Slowloris, zero-day attacks, and DDoS assaults that take
advantage of Apache or Windows vulnerabilities fall under this category [5].
Future Internet 2023, 15, 76 3 of 24
The solutions offered to understand DDoS attacks at the TCP/IP layer capture only a
subset of DDoS incidents at the application layer. The resolutions that detect entire types
of application-layer attacks are very complicated in formula. One set of tasks in detecting
a DDoS outbreak at the TCP/IP layer is the unavailability of landscapes to detect such
incidents [6]. HTTP-GET DDoS attacks are a risk for all web servers, as bots are able to
impersonate humans and make it difficult to distinguish malicious requests from real ones.
Regardless of industry or scale, enterprises around the world are increasingly becoming
targets of DDoS attacks.
Complexity and strength of these attacks are increasing exponentially as the number of
admitted systems increase, vulnerabilities go un-patched, and business impact increases [7].
DDoS attacks have a strong impact on the cyber domain. Cyber attacks are feared to disrupt
the regular functioning of the organization through IP overflow, bandwidth spoofing,
intensive memory resources, and root sane or mouse damage [8]. A slow-moving DDoS
attack has the capacity to mimic real traffic with its traffic. It is simple to avoid detection
by current systems. Based on their rank values, rank correlation techniques can detect
significant differences between attack traffic and legitimate traffic [9].
DoS attack has serious impacts on information servers, internet servers, and cloud com-
puting servers [10,11]. Botnets, DDoS, hacking, malware, pharming, phishing, ransomware,
spam, spoofing, and spyware are some of the most frequent hazards [12]. According to
Ginni Rometty, Chief Executive Officer IBM, the biggest risk to any or all businesses world-
wide is a cyberattack. With that, there is an increase in cybercriminals [9]. Malicious users
use numerous hacking methods to hack client servers. DDoS attacks are very wide-ranging
attacks and occur between other cyber attacks; detecting DDoS attacks is not easy. Three
basic types of DDoS attacks are described below.
attacks seem to be legitimate and innocent applications, and they target the web server.
The extent is measured by requests per second.
The number of attacks and the associated traffic volume continue to increase dramat-
ically. With such traffic intensity, the network infrastructure upstream of the intended
victim is also severely impacted, so attack traffic must be filtered as close as possible to
the sources of attack. However, it is difficult to predict and identify such nodes, as at-
tacks originate from widely distributed nodes and spread across multiple locations. To
successfully respond by disrupting traffic, the mitigation approach must detect malicious
traffic and respond with minimal impact on legitimate traffic. The attacker launches a new
attack, known as increasing DDoS attack and proxy DDoS attack. We develop a detection
algorithm to solve this problem. The detection algorithm uses deep-learning techniques to
detect malicious traffic and separate legitimate traffic from malicious traffic. The algorithm
classifies traffic into three categories: (1) normal traffic (2) suspicious traffic (3) malicious
traffic. The main contributions of this study are summarized below.
1. We addressed novel application layer DDoS attack by analyzing the characteristics of
incoming data packets including size of HTTP frame packets, number of IP addresses
sent, constant mappings of ports, and number of IP addresses using proxy IP.
2. We analyzed the client’s behavior in public attacks using standard datasets, CTU-13
dataset, real web logs (dataset) from our organization, and experimentally created
datasets from DDoS attack tools such as Slow Lairs, Hulk, Golden Eyes, and Xerex.
3. A deep learning classification algorithm, multilayer perceptron (MLP), is proposed to
evaluate the effectiveness of attack detection based on metrics.
4. Our proposed MLP classification model provided the lowest value of false positives as
compared with conventional classifiers such as Naïve Bayes, Decision Stump, Logistic
Model Tree, Naïve Bayes Updateable, Naïve Bayes Multinomial Text, AdaBoostM1,
Attribute Selected Classifier, Iterative Classifier, and OneR.
The rest of the article is organized as follows. Section 2 briefly describes the litera-
ture review; the problem motivation is discussed in Section 3. Chart flow and research
methodology are presented in Section 4. The proposed attack classification model is briefly
described in Section 5 and simulation results are elaborated upon in Section 6. Finally,
Section 7 concludes this study along with future work.
2. Literature Review
Machine learning algorithms are being widely used by research community in every
field of life. Prominent application areas of machine learning algorithms include image
processing, forecasting, recommendation systems, healthcare, banking system, defence,
education, robotics, etc. [13]. Deep learning is a subset of machine learning. In this study,
we have used a deep learning algorithm, namely, multilayer perceptron (MLP), for effective
and efficient detection of DDoS attacks. State-of-art literature on DDoS attack detection is
summarized in the following.
Authors of [14] have focused on mitigating multi-page HTTP DDoS attacks with
slow-moving targets that target public servers. The conceptual proof model was used in a
simple and validated the argument. In [15], the authors compared the probability similarity
between cyber attack, DDoS, and mathematical prototypical probability, Levy Walks. This
variation aimed to determine the suitability of Levy walk as prototypical similarity with
DDoS potential features. In [16], the authors experimented with the clever subject of
comedy measurement that utilizes a conference seeking philosophy and a brilliant channel
that sets shares in the traditional way. Multilayer perceptron with genetic algorithm (MLP-
GA) is proposed in [17] to detect DDoS attacks. The authors examined the areas of incoming
pockets as well.
It is assumed that the non-receiver of an unusual collection returns once at the time of
publication. However, the authors of [18] provided a sequence of events for experimental
distribution to test the capabilities. The authors did not show a positive impact on stock
recovery, but in cases where DDoS attacks cause disruptions within the services sent by the
Future Internet 2023, 15, 76 5 of 24
client, the study experienced a strong negative impact. The current unit of current methods
was created due to the actual malfunction of DDoS attack detection in the application layer.
The authors of [19] developed a phase-based system with downloading local packets,
fine-field extraction of these local units needed for detection, and the use of a separator for
attack detection. The study at [20] examined the impact of a DDoS attack on a state-of-the-
art gift network and evaluated network security mechanisms such as a router protection
system and network servers. In [21], the authors presented a solution for such a type
of DDoS attack. When the server exceeded the limit of its application, the author then
proposed a solution and sent a random number, which can be selected at an unconsidered
time value, to the requesting client.
Research at [22] provided a design that increases resilience to DDoS attacks by upgrad-
ing the roles of a virtual network and the software that defines a network. In the first phase,
the proposed design defines the roles of the virtual network by solving the linear system. In
phase two, to increase the previous protection against DDoS attacks, special VNF filters and
a second path through these VNF filters were established by solving another linear system.
SDN controller switches routes with a second attack to DDoS traffic filtering methods to
prevent congestion under DDoS attacks. In [23], the authors provided a flexible identifier
that is set periodically in the background and can make additional data selections. The
authors provided applications related to the occurrence of a DDoS-based attack group and
a metalfolding model that combines two orthogonal oddity-based attack modes.
In [24], the authors provided a DDoS detection combining a fully based standard
and an exceptionally dependent method in which three types of machine applications are
found. The author first studied the performance of the proposed system under conditions
enforced by normal saturation and TFN2K attacks. Then, the authors apply small costs,
such as a saturation period with key traffic attack points, to soak the victim. The authors
of [25] investigated our hypotheses about the problem in the existing diagnosis method of
the attack on the DoS application base with a strong attack on the algorithm of the CUSUM
system. In [26], the researchers developed bio-roused conflicts, based largely on the DDoS
Assault framework, with the goal of achieving a faster space. The given prototype can be a
bio-roused bat algorithm system, which usually handles the fast and timely location of a
DDoS application over HTTP floods.
The authors of [27] proposed a cloud-based firewall to reduce DDoS attacks on the
smartest grid network AMI. The Promoted Firewall is not only able to reduce the impact of
DDoS attacks, but can also prevent attacks before they start. In [28], the authors demon-
strated another planning phase to detect and prevent multiple DDoS TCP (CS_DDoS)
attacks during the day. The proposed CS_DDoS framework provides response protection
for deleted records. In [29], the authors provided an event detection module to limit the
proliferation of internet of things (IoT) services. It was modified from the current moni-
toring modules with information-based filters. The proposed module focuses on system
behavior during DDoS attacks and detects them using NTP-collected information used in
the synchronization service. The author performed a demo test with an advanced module
that generates a fake DDoS attack. The result showed that the deployed modules obtain
high memory and accurate values, which show their effectiveness in capturing real-time
events in IoT.
A study done by [30] presented exponentially weighted moving normal (EWMA)
search for amazing mine learning and DDoS base discovery attacking internet of things
(IoT). The authors investigated the tradeoff between statistical detection rate, warning,
and localization delay. In [31], the authors narrow down the classification of DDoS threats
that support unusual behavior in the application layer and provide elliptical data on
various DDoS tools. In addition, the author distinguishes methods of DDoS detective work
based on viewing, blocking, detecting, and minimizing comments. In [32], a step-by-step
approach to DDoS attack mitigation was presented, where the entire process of mitigating
DDoS attacks was forced to a single layer or multiple layers. To increase the security
of DDoS attacks, the go-layer process has become a useful solution. The authors of [33]
Future Internet 2023, 15, 76 6 of 24
presented a new plastic strategy for detecting Al-DDoS attacks. Their aforementioned work
differs from the previous method by considering the detection of Al-DDoS attacks in critical
spine motions.
A distributed, useable, automated, and interactive ISP standard was presented by the
study’s authors in [34]. It not only distributes computing complexity and storage to adjacent
places, but also facilitates the early identification of DDoS attacks and flash occurrences.
Using an independent multi-agent system and agents that depend on particle evolution to
facilitate effective communication and precise decision-making, the authors of [35] present
a unique DDoS attack detection and prevention technique. Multiple intermediate agents
are used to detect DDoS attacks, and the coordinating agent is updated. A secure root
system and an access system that can identify nearby attacks on the RPL protocol have
been suggested by experts of [36] in order to mitigate the effects of such attacks. To find the
malicious node, the IDS is developed, taking into account the location data and the received
signal strength. Researchers discovered perplexing real-time blocking DDoS application
layer assaults on the web in [37] that seek to be discovered quickly and quickly. ARTP is
a machine learning technique for quick and accurate app DDoS detection using multiple
flood requests. The work’s goal was achieved by measuring LLDoS databases through
tests, and the findings showed how valuable the proposed model is.
A hybrid protocol proposed by the authors of [38] is the best suited protocol for
cloud computing to detect DDoS attacks. The authors of [39] provide a new approach
presented in this study. With the presence of these types of malicious nodes, attacks can be
classified as active and inactive. In [40], the authors propose to identify the DDoS attack
and mitigation model using the feature selection method. In the presented study, the
network traffic is primarily analyzed according to the Hellinger degree. When a certain
distance is detected, all data packets are analyzed and classified into two categories based
on the selected segmentation factor, such as DDoS and official application groups [41]. The
authors have addressed the problem and developed a secure system for these programs.
The experts of [42] proposed a botnet detection method that can manage multiple datasets
and also detect botnets in the network. In [43], researchers addressed the need to prevent
DDoS attacks by defining and demonstrating a mixed identification model by introducing
an advanced and effective method to identify and effectively distinguish flooding in
a hot crowd.
In addition to introducing a multi-level classification method based on the presented
set of entropy-based features with machine learning divisors to improve the low visibility
and accuracy, the authors of [44] also introduced a set of novel entropy-based symbols to
help reliably detect DDoS attacks. In [45], researchers discussed four important network
protection schemes against end-to-end network attacks, end-to-end, victim, and distributed
schemes with a focus on two innovative models, Gossip and D- WARD. In [46], the authors
introduced a reduction method based on the fuzzy control system. It looks like inserting
two new matrices.
In [47], the researchers presented a novel selection algorithm, Dynamic Ant Colony
System, with a choice of three levels of renewal function. The presented method uses
different levels of pheromones to make the ants stronger. The proposed method by the
authors of [48] is contrasted with a different hybrid algorithm that is provided with 10-
fold cross-validation. The proposed method outperforms existing methods in terms of
accuracy, detection rate, and false alarm rate, according to the database-based test results
of KDD CUP 99. In [49], the experts proposed a new method to mark a packet that could
be forwarded from the attacker’s side to the victim’s side. It allows the victim to ensure the
necessary protection for internet service providers (ISPs).
In the manuscript, [50], the authors propose a defense system called SkyShield. This
scheme uses a graphical data framework to identify and mitigate DDoS attacks at the
application level. First, they proposed new split calculations in two graphs that improve
the effect of network dynamics and increase the accuracy of detection. Second, they used
an atypical graph to help identify the malicious predators of a persistent attack. In [51],
Future Internet 2023, 15, 76 7 of 24
the researchers proposed the concept of a system of experts. This program automatically
resets security apps about incoming traffic. To achieve this, it is proposed to use a model,
reasoning, and performance-based loop (LRA-M). In this case, it describes the structures
of the corresponding system and defines its building blocks. In [52], the authors used a
state-of-the-art SDN model, employing a new method for DDoS detection and mitigation
known as State Sec. They demonstrated the benefits of this type of method, as shown in
Figure 3.
The authors of [53] analyzed a number of current machine learning (ML) research
projects that spread SDN for NIDS implementation. It was discovered that deep learning
techniques had been looked into for the creation of SDN-based NIDS. Key steps of DDoS
detection and mitigation in software-defined networking are shown in Figure 3. A brand-
new authentication method was put forth in [53] as a defence against DDoS assaults
on approved domain name servers. For duplicate resolvers, the solution employed the
DNAME record to sign the domain redirection guide and then correctly reroute traffic to
their downstream query domains. Many domains can be connected to vast and flexible
provisioning and release of approved services to quickly raise demand in response to DDoS
attacks. Results from imitations show that this solution works.
In [54], the authors proposed a new confusing discovery system with a unique parallel
session feature attack detection (SFAD). The proposed process consists of two main steps.
The first step is to set up smooth windows to collect web access information for different
users; the second one is the PageRank method, used to control the weight information of
web pages and calculate the similarity information for users. In [55], the authors proposed
a IDS design that used ML algorithms such as Hidden Markov Model with a multi-pronged
approach. This approach was developed and proven to solve common bugs in using the
Hidden Markov Model in IDS, commonly referred to as the curse of size.
Based on psychologically inspired computations using entropy two-address represen-
tation, the inventors of the DDoS detection and defence technique developed their method
in [56]. A vector segmentation technique is installed for support, the flow table features
are retrieved, and the DDoS assault model is developed. In [57], the authors focused on
internal DoS/DDoS attacks on WAMS devices using potential resources. To counter this
type of attack, the authors propose an earlier and stronger extension of the multipath TCP
(MPTCP) transport protocol, which they call MPTCP-H.
In [58], the authors proposed a fault detection method based on the study of mobile
cloud computing that includes various client networks, as shown in Figure 4. The presented
method does not require rule checking and its problem can be adapted to the needs of
client networks. The authors of [59] have developed a collection-based approach to classify
data representing the flow of network traffic. It combines normal traffic with DDoS.
Future Internet 2023, 15, 76 8 of 24
The authors of [60] provided a general overview of the use of SDN to improve net-
work security, as shown in Figure 5. In particular, the authors examined recent research
that emphasizes the use of SDN for network security. These include attack detection and
mitigation, network traffic monitoring, service chaining, policy adaptation and manage-
ment, centralized box deployment, and smart network security. On the basis of the newly
announced Boltzmann Restricted Machines, the authors of [61] proposed an ingenious city-
based diagnostic paradigm (RBMs). RBMs process the data produced by smart metres and
sensors in real time by utilizing their capacity to unconventionally learn high-level aspects
of raw data. In [62], the authors presented a new method for detecting the involvement
of network devices in DDoS attacks. For this purpose, the traces next to the source are
examined to detect inconsistent behavior.
In [63], the authors proposed ForChaos, a lightweight detection algorithm for IoT
devices based on predictive and chaotic perception to detect flooding and DDoS attacks.
In [64], the authors first developed the new Chinese Remainder Theorem based on the
Reversible Sketch (CRT-RS). It can not only compress and consolidate large network traffic,
but is also able to detect atypical keys as unwanted/malicious or network traffic sources.
The literature review is summarized in Tables 1–3.
Future Internet 2023, 15, 76 9 of 24
Paper Year Objective Incremental Analysis Assumptions Used Relative Complexity Real-Time Detection
[14] 2017 Mitigation of multi-page HTTP DDoS attacks No No High No
[15] 2016 To determine suitability of Levy walk for DDoS detection No Yes Medium No
[16] 2017 DDoS attack detection Yes Yes Medium No
[17] 2017 To detect DDoS attacks No Yes High No
[18] 2017 DDoS attack detection No No High No
[19] 2016 Attack detection No Yes High No
[20] 2016 Router protection system No Yes Medium No
[21] 2016 DDoS attack detection No Yes Medium No
[22] 2017 Increases resilience to DDoS attacks No Yes High No
[23] 2016 Flexible DDoS attack identifier No Yes High No
[24] 2016 DDoS attack detection No No High No
[25] 2017 Diagnosis method of attack on DoS applications No No High No
[26] 2017 Fast and timely location of a DDoS application over HTTP floods No No Low No
[27] 2017 Cloud-based firewall to reduce DDoS attacks Yes Yes Medium No
[28] 2017 To detect and prevent multiple DDoS TCP attack No No High No
[29] 2017 An event detection module No Yes High No
[30] 2016 Mine learning and DDoS base discovery No No High Yes
[31] 2016 Classification of DDoS threats No Yes Medium No
[32] 2017 DDoS attack mitigation No No Medium No
[33] 2014 Detection of Al-DDoS attacks No Yes High No
[34] 2018 Early identification of DDoS attacks and flash occurrences No Yes Medium No
Future Internet 2023, 15, 76 10 of 24
Paper Year Objective Incremental Analysis Assumptions Used Relative Complexity Real-Time Detection
[35] 2018 Unique DDoS attack detection and prevention technique No Yes High No
[36] 2018 Mitigation of the effects of DDoS attacks No Yes High No
[37] 2018 Real-time blocking DDoS application No Yes High Yes
[38] 2018 To detect DDoS attacks No No Medium No
[39] 2018 DDoS attacks classification as active and inactive No No Medium No
[40] 2018 Model to identify DDoS attack and mitigation No No High No
[41] 2018 Developed a secure system No No High No
[42] 2018 Manage multiple datasets and also detect botnets in the network No No High No
[43] 2018 To prevent DDoS attacks No No High No
[44] 2018 Novel entropy-based symbols to help reliably detect DDoS attacks No Yes Medium No
[45] 2018 Network protection schemes against end-to-end network attacks No No High No
[46] 2018 Reduction method based on the fuzzy control system No Yes Medium No
[47] 2018 Novel selection algorithm No No High No
[48] 2018 Accuracy of attack detection rate and false alarm rate Yes No High No
[49] 2018 To mark a malicious packet to be forwarded from the attacker Yes No Medium No
[50] 2018 Graphical data framework to identify and mitigate DDoS attacks No No High No
[51] 2018 Automatically resets security apps about incoming traffic No No High No
Future Internet 2023, 15, 76 11 of 24
Paper Year Objective Incremental Analysis Assumptions Used Relative Complexity Real-Time Detection
[52] 2019 DDoS detection and mitigation Yes No High No
[53] 2019 SDN-based NIDS No No High No
[54] 2019 Session feature attack detection No Yes Medium No
[55] 2019 To solve common bugs in IDS No No Medium No
[56] 2019 DDoS detection and defense technique No No High No
[57] 2019 To counter DoS/DDoS attacks on WAMS devices No No High No
[58] 2019 A fault detection method for mobile cloud computing No Yes Medium No
[59] 2019 Collection-based approach to classify the network traffic No Yes Low Yes
[60] 2019 To improve network security Yes Yes Medium No
[61] 2019 Ingenious city based diagnostic paradigm No Yes High No
[62] 2019 To detect malicious network devices involved in DDoS attacks Yes Yes Medium No
[63] 2019 A lightweight detection algorithm for IoT devices No Yes Medium No
[64] 2019 To detect malicious or network traffic sources No No High No
Ours 2022 Metrics-based DDoS attack detection Yes No Low Yes
Future Internet 2023, 15, 76 12 of 24
3. Motivation
In reviewing the above work, we have encountered a gap between ongoing research.
The need for current and future technology is increasing. Various researchers have ad-
dressed DDoS attacks according to the literature review, but to some extent, they have only
addressed one or two types of attacks and disregarded the rest. There are two major DDoS
attacks that need to be addressed simultaneously, namely:
1. Increasing DDoS attack strategy;
2. Proxies DDoS attack strategy.
All this will help us in developing such algorithms that are secure enough so that they
cannot be easily breached by attackers, and the unavailability of services may be avoided.
Start
No
IF (S-IP == GET_request or S-IP ==
POST_request)
Yes
Se_Time[]=SourceIP_TimeFrame
Packet_length[]=SourceIP_packetlength
IF (S-IP
ProxyIP-count++
==Anonymous_ProxyList_IP)
Yes
No
If arr[i] == arr[j];
If arr[i] == arr[j];
No Yes
TQ == Low If (No of Host equal
TQ == High
session time = > 20)
No Yes
If (No of Host equal
PKQ == Low PKQ == High
Packet frame size = > 20)
No Yes
PX-IP == Low IF (ProxyIP-count = PX-IP == High
> 20)
End
Our proposed algorithm uses high and low values for the first, second, and third
parameters and varying and fixed values for the fourth parameter, as shown in Table 4.
Figure 7 depicts the structure of the chosen network. The error histogram of the chosen
network is shown in Figure 8.
Future Internet 2023, 15, 76 15 of 24
Table 4. Grouping of different parameters for DDoS attack detection criteria. Note: TQ: no. of host
spent equal session time; PKQ: no. of host equal packet length; PX-IP: no. of host use proxy server;
SourcePort: host changing ports; PD: pattern detection.
∂E
= δk a j (1)
∂w jk
The following Equation (2), is used for calculation of error derivatives w.r.t. output
layer biases (bk ).
∂E ∂E
= a k − t k gk 0 z k = δk (2)
∂bk ∂bk
The weights of hidden layers are calculated using following Equation (3).
∂E
= ∑ ( ak − tk ) gk0 (zk )w jk gk0 (z j ) ai
∂wij k∈K
∂E
= g j0 (z j ) ai ∑ ( ak − tk ) gk0 (zk )w jk (3)
∂wij k∈K
∂E
= ai g j0 (z j ) ∑ (δk )w jk
∂wij k∈K
TP + TN
Accuracy = (4)
TP + TN + FP + FN
When an observation is true positive (TP), it means that it is both predicted to be
positive and is, in fact, positive. A true negative (TN) observation is one that is both
predicted to be and really is negative. False positive (FP) observations are those that were
expected to be positive, but turned out to be negative. False negative (FN) observations are
those that are projected to be negative, but turn out to be positive.
TP
TPR = (5)
TP + FN
FPR or specificity can be expressed with the help of Equation (6).
FP
FPR = (6)
FP + TN
The ROC is used to plot TPR against FPR at different classification thresholds. At a
lower classification threshold, more elements are classified as positive, increasing both the
FPR and TPR.
6.3. Dataset
We have divided the whole dataset into three data sets, namely, a verification set (15%),
a test set (15%), and a training set (70%). The verification set is used to measure the network
efficiency and stop training upon normal stopping criteria. The test set does not affect
training, and thus, provides an independent measure of network performance. The training
set is used for training of our proposed model. In the training phase, the best verification
performance occurs during the 37th round, and the network is configured during the 37th
round. Evaluation of test input, shown in Table 5, provides the corresponding values for
the specified errors.
Figure 10 shows the performance diagram. From the performance diagram, the user
can see the current status of the training process. The X-axis of this diagram indicates the
number of iterations, while the Y-axis indicates the cross-entropy value for each iteration.
The blue line graph represents the training results, the green represents the validation
results, and the red represents the testing results. This performance graph is calculated
for each iteration in the training process. The graph in which all three results of training,
validation, and testing match in almost all points is selected as the best performance. The
best performance value is 2.9778 × 10−7 , which means that the behavior of the network is
stable, and its generalizability is sufficiently high. Evaluation results of Data1 and Data2
are shown in Table 6. Evaluation results of training, testing, and validation of the dataset
are shown in Table 7.
Data1 Data2
Parameter(s)
X Y X Y
Min 0 9.768 × 10−7 0 0
Max 40 0.3977 40 0
Mean 20 0.03192 20 0
Median 20 0.0003166 20 0
Mode 0 9.768 × 10−7 0 0
Std 11.98 0.08324 11.98 0
Range 40 0.3977 40 0
Figure 12. Receiver operating characteristic (ROC) curves of proposed MLP classification model.
Future Internet 2023, 15, 76 20 of 24
(a) MLP vs. Naïve Bayes. (b) MLP vs. Decision Stump.
(c) MLP vs. LMT. (d) MLP vs. Naive Bayes Updateable.
(e) MLP vs. Naïve Bayes Multinomial Text. (f) MLP vs. AdaBoostM1.
(g) MLP vs. Attribute Selected Classifier. (h) MLP vs. Iterative Classifier Optimizer.
Figure 14. Accuracy comparison of proposed MLP classifier with other classification models.
Future Internet 2023, 15, 76 21 of 24
It is clear from the results shown in Table 8 that MLP classifier outperforms all other
classification models with an efficiency of 98.99%. Using our proposed MLP classifier,
we can quickly recognise DDoS assaults at the application level. We are able to identify
between legitimate clients and attackers using the proposed MLP classifier. Some of the
presumed IP addresses, meanwhile, do not fit the mould of a typical client or an attacker.
In this study, we tested the effectiveness of our proposed technique by using it to identify
attacks in real-world DDoS attack datasets including CTU-13 (2011), our company’s web
logs (2019), and our own dataset. The detection accuracy analysis of ten classifiers is shown
in Figure 14.
Table 8. Comparison of proposed model (MLP) with other models. Note: NB: NaiveBayes, DS: Deci-
sionStump, LMT: Logistic Model Tree, NBU: NaiveBayesUpdateable, NBMT: NaiveBayes Multinomial
Text, ASC: Attribute Selected Classifier, ABM1: AdaBoostM1, ICO: Iterative Classifier Optimizer,
MLP: Multilayer Perceptron, CM: Confusion Matrix
Criteria NB DS LMT NBU NBMT ABM1 ASC ICO OneR MLP (Proposed)
CM
a b 420 45 400 40 435 33 410 44 314 29 425 34 408 22 419 41 425 44 489 50
c d 22 10 35 200 40 225 25 234 26 233 21 212 15 211 27 219 27 217 30 40
Accuracy 0.9331 0.8811 0.9401 0.9323 0.7133 0.8801 0.9145 0.9254 0.8835 0.9899
TP 0.9631 0.8901 0.9400 0.9000 0.6900 0.8611 0.8900 0.8800 0.8455 0.9799
FP 0.432 0.5670 0.0996 0.0690 0.9998 0.9897 0.8675 0.7989 0.9698 0.0211
Author Contributions: Methodology, S.A. (Sheeraz Ahmed), Z.A.K. and S.M.M.; Software, S.A.
(Sheeraz Ahmed), Z.A.K., S.M.M. and S.L.; Validation, S.M.M., S.A. (Sheraz Aslam) and H.M.; Formal
analysis, S.A. (Sheraz Aslam), S.M.M., M.A. and H.M.; Investigation, S.A. (Sheeraz Ahmed), M.A.
and Z.N.; Data curation, S.A. (Sheeraz Ahmed), M.A., S.L. and Z.N.; Writing—original draft, S.A.
(Sheeraz Ahmed), Z.A.K. and S.M.M.; Writing—review & editing, S.A. (Sheraz Aslam), H.M., S.L.
and Z.N.; Visualization, S.A. (Sheraz Aslam), Z.A.K. and Z.N.; Supervision, S.A., (Sheeraz Ahmed)
Z.A.K. and S.M.M.; Project administration, S.A. (Sheeraz Ahmed), S.M.M., S.L., S.A. (Sheraz Aslam)
and H.M.; Funding acquisition, S.M.M., S.A. (Sheraz Aslam) and H.M. All authors have read and
agreed to the published version of the manuscript.
Future Internet 2023, 15, 76 22 of 24
References
1. Singh, K.; Singh, P.; Kumar, K. Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges. Comput.
Secur. 2017, 65, 344–372. [CrossRef]
2. Mustafa, I.; Khan, I.U.; Aslam, S.; Sajid, A.; Mohsin, S.M.; Awais, M.; Qureshi, M.B. A lightweight post-quantum lattice-based
RSA for secure communications. IEEE Access 2020, 8, 99273–99285. [CrossRef]
3. Behal, S.; Kumar, K. Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. IJ Netw. Secur.
2017, 19, 383–393.
4. Jiang, M.; Wang, C.; Luo, X.; Miu, M.; Chen, T. Characterizing the Impacts of Application Layer DDoS Attacks. In Proceedings of
the 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA, 25–30 June 2017; IEEE: Piscataway, NJ, USA,
2017; pp. 500–507.
5. Yusof, M.A.M.; Ali, F.H.M.; Darus, M.Y. Detection and Defense Algorithms of Different Types of DDoS Attacks. Int. J. Eng. Technol.
2017, 9, 410. [CrossRef]
6. Yadav, S.; Subramanian, S. Detection of Application Layer DDoSattack by feature learning using Stacked AutoEncoder. In
Proceedings of the 2016 International Conference on Computational Techniques in Information and Communication Technologies
(ICCTICT), New Delhi, India, 11–13 March 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 361–366.
7. Stefanidis, K.; Serpanos, D.N. Countermeasures Against Distributed Denial of Service Attacks. In Proceedings of the 2005 IEEE
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Sofia, Bulgaria, 5–7 September
2005; IEEE: Piscataway, NJ, USA, 2005; pp. 439–442.
8. Bandara, K.R.W.V.; Abeysinghe, T.; Hijaz, A.; Darshana, D.G.T.; Aneez, H.; Kaluarachchi, S.J.; Sulochana, K.D.; DhishanDham-
mearatchi, M. Preventing DDoSAttack Using Data Mining Algorithms. Int. J. Sci. Res. Publ. 2016, 6, 390.
9. Ain, A.; Bhuyan, M.H.; Bhattacharyya, D.K.; Kalita, J.K. Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical
Evaluation. IJ Netw. Secur. 2016, 18, 474–480.
10. Devare, A.; Shelake, M.; Varsha, V.; Kamble, P.; Tamboli, B. A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis. Int. Res. J. Eng. Technol. (IRJET) 2016, 3, 1917–1923.
11. Haq, M.A.; Khan, M.A.R.; Talal, A.H. Development of PCCNN-based network intrusion detection system for EDGE computing.
Comput. Mater. Contin. 2022, 71, 1769–1788.
12. Haq, M.A.; Khan, M.A.R. DNNBoT: Deep neural network-based botnet detection and classification. CMC-Comput. Mater. Contin.
2022, 71, 1729–1750.
13. Haq, M.A.; Khan, M.A.R.; Alshehri, M. Insider Threat Detection Based on NLP Word Embedding and Machine Learning. Intell.
Autom. Soft Comput. 2022, 33, 619–635.
14. Eid, M.S.A.; Aida, H. Secure Double-Layered Defense against HTTP-DDoS Attacks. In Proceedings of the 2017 IEEE 41st Annual
Computer Software and Applications Conference (COMPSAC), Turin, Italy, 4–8 July 2017; IEEE: Piscataway, NJ, USA, 2017;
Volume 2, pp. 572–577.
15. Gonzalez, J.D.T.; Kinsner, W. Zero-crossing analysis of Lévy walks for real-time feature extraction: Composite signal analysis
for strengthening the IoT against DDoS attacks. In Proceedings of the 2016 IEEE 15th International Conference on Cognitive
Informatics & Cognitive Computing (ICCI* CC), Palo Alto, CA, USA, 22–23 August 2016; IEEE: Piscataway, NJ, USA, 2016; pp.
143–153.
16. Kavisankar, L.; Chellappan, C.; Venkatesan, S.; Sivasankar, P. Efficient SYN Spoofing Detection and Mitigation Scheme for DDoS
Attack. In Proceedings of the 2017 Second International Conference on Recent Trends and Challenges in Computational Models
(ICRTCCM), Tindivanam, India, 3–4 February 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 269–274.
17. Singh, K.J.; De, T. MLP-GA based algorithm to detect application layer DDoS attack. J. Inf. Secur. Appl. 2017, 36, 145–153.
[CrossRef]
18. Joosten, R.; Nieuwenhuis, L.J. Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices. In Proceedings of
the 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), St. Petersburg,
Russia, 6–8 March 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 354–362.
19. Ajagekar, S.K.; Jadhav, V. Study on web DDOS attacks detection using multinomial classifier. In Proceedings of the 2016 IEEE
International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, India, 15–17 December 2016;
IEEE: Piscataway, NJ, USA, 2016; pp. 1–5.
20. Akbar, S.; Wibawa, A.D. The impact analysis and mitigation of DDoS attack on local government electronic procurement service
(LPSE). In Proceedings of the 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA), Lombok,
Indonesia, 28–30 July 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 405–410.
21. Ali, S.T.; Sultana, A.; Jangra, A. Mitigating DDoS attack using random integer factorization. In Proceedings of the 2016 Fourth
International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India, 22–24 December 2016; IEEE:
Piscataway, NJ, USA, 2016; pp. 699–702.
Future Internet 2023, 15, 76 23 of 24
22. Alparslan, O.; Gunes, O.; Hanay, Y.S.; Arakawa, S.I.; Murata, M. Improving resiliency against DDoS attacks by SDN and
multipath orchestration of VNF services. In Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan
Area Networks (LANMAN), Osaka, Japan, 12–14 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–3.
23. Bhatia, S. Ensemble-based model for DDoS attack detection and flash event separation. In Proceedings of the 2016 Future
Technologies Conference (FTC), San Francisco, CA, USA, 6–7 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 958–967.
24. Chen, C.; Chen, H. A resource utilization measurement detection against DDoS attacks. In Proceedings of the 2016 9th
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Datong, China,
15–17 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1938–1943.
25. Jazi, H.H.; Gonzalez, H.; Stakhanova, N.; Ali, A. Ghorbani. Detecting HTTP-based application layer DoS attacks on web servers
in the presence of sampling. Comput. Netw. 2017, 121, 25–36. [CrossRef]
26. Sreeram, I.; Vuppala, V.P.K. HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat
algorithm. Appl. Comput. Inform. 2017, 15, 59–66. [CrossRef]
27. Diovu, R.C.; Agee, J.T. A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks. In
Proceedings of the 2017 IEEE PES PowerAfrica, Accra, Ghana, 27–30 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 28–33.
28. Sahi, A.; Lai, D.; Li, Y.; Diykh, M. An efficient DDoS TCP flood attack detection and prevention system in a cloud environment.
IEEE Access 2017, 5, 6036–6048. [CrossRef]
29. Kawamura, T.; Fukushi, M.; Hirano, Y.; Fujita, Y.; Hamamoto, Y. An NTP-based detection module for DDoS attacks on IoT. In
Proceedings of the 2017 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taipei, Taiwan, 12–14 June
2017; IEEE: Piscataway, NJ, USA, 2017; pp. 15–16.
30. Machaka, P.; Bagula, A.; Nelwamondo, F. Using exponentially weighted moving average algorithm to defend against DDoS
attacks. In Proceedings of the 2016 Pattern Recognition Association of South Africa and Robotics and Mechatronics International
Conference (PRASA-RobMech), Stellenbosch, South Africa, 30 November–2 December 2016; IEEE: Piscataway, NJ, USA, 2016;
pp. 1–6.
31. Kumar, V.; Kumar, K. Classification of DDoS attack tools and its handling techniques and strategy at application layer. In
Proceedings of the 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA)
(Fall), Bareilly, India, 30 September–1 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–6.
32. Mahale, V.V.; Pareek, N.P.; Uttarwar, V.U. Alleviation of DDoS attack using advance technique. In Proceedings of the 2017
International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bengaluru, India, 21–23 February 2017;
IEEE: Piscataway, NJ, USA, 2017; pp. 172–176.
33. Zhou, W.; Jia, W.; Wen, S.; Xiang, Y.; Zhou, W. Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Gener. Comput. Syst. 2014, 38, 36–46. [CrossRef]
34. Behal, S.; Kumar, K.; Sachdeva, M. D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and
flash events. J. Netw. Comput. Appl. 2018, 111, 49–63. [CrossRef]
35. Kesavamoorthy, R.; Soundar, K.R. Swarm intelligence based autonomous DDoS attack detection and defense using multi agent
system. Clust. Comput. 2018, 4, 9469–9476. [CrossRef]
36. Thomas, A.; Kumar, T.G.; Mohan, A.K. Neighbor Attack Detection in Internet of Things. In Advanced Computational and
Communication Paradigms; Springer: Singapore, 2018; pp. 187–196.
37. Prasad, K.M.; Reddy, A.R.M.; Rao, K.V.G. An Experiential Metrics-Based Machine Learning Approach for Anomaly Based Real
Time Prevention (ARTP) of App-DDoS Attacks on Web. In Artificial Intelligence and Evolutionary Computations in Engineering
Systems; Springer: Singapore, 2018; pp. 99–112.
38. Rezaei, H.; Farjamib, Y.; Yektae, M.H. A Novel Framework for DDoS Detectionin Huge Scale Networks, ThankstoQoS Features.
arXiv 2018, arXiv:1801.02300.
39. Hassan, I.U.; Kaur, A. Prevention and detection of DDoS attack on WSN. International Journal of Research Culture Society. 2018,
2, 245–249.
40. Bharot, N.; Verma, P.; Sharma, S.; Suraparaju, V. Distributed Denial-of-Service Attack Detection and Mitigation Using Feature
Selection and Intensive Care Request Processing Unit. Arab. J. Sci. Eng. 2018, 43, 959–967. [CrossRef]
41. Ali, Y.; YXia, u.; Ma, L.; Hammad, A. Secure design for cloud control system against distributed denial of service attack. Control
Theory Technol. 2018, 16, 14–24. [CrossRef]
42. Shah, M.; Ahmed, S.; Hussain, M.; Jan, S. Mitigating the Knock-on-Effect of DDoS Attacks on Application Layer using Deep
Learning Multi-Layer Perception. J. Inf. Commun. Technol. Robot. Appl. 2020, 11, 15–30.
43. Girma, A.; Garuba, M.; Goel, R. Advanced Machine Language Approach to Detect DDoS Attack Using DBSCAN Clustering
Technology with Entropy. In Information Technology New Generations; Springer: Cham, Switzerland, 2018; pp. 125–131.
44. Koay, A.; Chen, A.; Welch, I.; Seah, W.K.G. A new multi classifier system using entropy-based features in DDoS attack detection.
In Proceedings of the 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 10–12 January
2018; IEEE: Piscataway, NJ, USA, 2018; pp. 162–167.
45. Zare, H.; Azadi, M.; Olsen, P. Techniques for Detecting and Preventing Denial of Service Attacks (A Systematic Review Approach).
In Information Technology-New Generations; Springer: Cham, Switzerland, 2018; pp. 151–157.
46. Singh, K.; Singh, P.; Kumar, K. Fuzzy-based User Behavior Characterization to Detect HTTP-GET Flood Attacks. Int. J. Intell. Syst.
Appl. 2018, 10, 29. [CrossRef]
Future Internet 2023, 15, 76 24 of 24
47. Rais, H.; Mehmood, T. Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection. Int. J.
Netw. Secur. 2018, 20, 184–192.
48. Keshtgary, M.; Rikhtegar, N. Intrusion Detection based on a Novel Hybrid Learning Approach. J. AI Data Min. 2018, 6, 157–162.
49. Nur, A.Y.; Tozal, M.E. Record route IP traceback: Combating DoS attacks and the variants. Comput. Secur. 2018, 72, 13–25.
[CrossRef]
50. Wang, C.; Miu, T.T.N.; Luo, X.; Wang, J. SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks.
IEEE Trans. Inf. Forensics Secur. 2018, 13, 559–573. [CrossRef]
51. Iffländer, L.; Walter, J.; Eismann, S.; Kounev, S. The Vision of Self-aware Reordering of Security Network Function Chains.
In Proceedings of the Companion of the 2018 ACM/SPEC International Conference on Performance Engineering, Berlin,
Germany, 9–13 April 2018; ACM: New York, NY, USA, 2018; pp. 1–4.
52. Rebecchi, F.; Boite, J.; Nardin, P.; Bouet, M.; Conan, V. DDoS protection with stateful software-defined networking. Int. J. Netw.
Manag. 2019, 29, e2042. [CrossRef]
53. Sultana, N.; Chilamkurti, N.; Peng, W.; Alhadad, R. Survey on SDN based network intrusion detection system using machine
learning approaches. Peer-Peer Netw. Appl. 2019, 12, 493–501. [CrossRef]
54. Xiao, R.; Su, J.; Du, X.; Jiang, J.; Lin, X.; Lin, L. SFAD: Toward effective anomaly detection based on session feature similarity.
Knowl.-Based Syst. 2019, 165, 149–156. [CrossRef]
55. Zegeye, W.; Dean, R.; Moazzami, F. Multi-Layer Hidden Markov Model Based Intrusion Detection System. Mach. Learn. Knowl.
Extr. 2019, 1, 265–286. [CrossRef]
56. Cui, J.; Wang, M.; Luo, Y.; Zhong, H. DDoS detection and defense mechanism based on cognitive-inspired computing in SDN.
Future Gener. Comput. Syst. 2019, 97, 275–283. [CrossRef]
57. Demir, K.; Ferdaus, N.; Suri, N. MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems.
Int. J. Crit. Infrastruct. Prot. 2019, 25, 84–101. [CrossRef]
58. Dey, S.; Ye, Q.; Sampalli, S. A Machine Learning Based Intrusion Detection Scheme for Data Fusion in Mobile Clouds Involving
Heterogeneous Client Networks. Inf. Fusion 2019, 49, 205–215. [CrossRef]
59. Aamir, M.; Zaidi, S.M.A. Clustering based Semi-Supervised Machine Learning for DDoS Attack Classification. J. King Saud
Univ.-Comput. Inf. Sci. 2019, 33, 436–446. [CrossRef]
60. Sahay, R.; Weizhi, M.; Jensen, C.D. The application of Software Defined Networking on securing computer networks: A survey.
J. Netw. Comput. Appl. 2019, 131, 89–108. [CrossRef]
61. Elsaeidy, A.; Munasinghe, K.S.; Sharma, D.; Jamalipour, A. Intrusion detection in smart cities using Restricted Boltzmann
Machines. J. Netw. Comput. Appl. 2019, 135, 76–83. [CrossRef]
62. Monge, M.A.S.; González, A.H.; Fernández, B.L.; Vidal, D.M.; RiusGarcía, G.; Vidal, J.M. Traffic-flow analysis for source-side
DDoS recognition on 5G environments. J. Netw. Comput. Appl. 2019, 136, 114–131. [CrossRef]
63. Procopiou, A.; Komninos, N.; Douligeris, C. ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos
Theory in Smart Home IoT Network. Wirel. Commun. Mob. Comput. 2019, 2019, 8469410. [CrossRef]
64. Jing, X.; Yan, Z.; Jiang, X. WitoldPedrycz Network traffic fusion and analysisagainst DDoS flooding attacks with a novel reversible
sketch. Inf. Fusion 2019, 51, 100–113. [CrossRef]
65. Aslam, S.; Herodotou, H.; Mohsin, S.M.; Javaid, N.; Ashraf, N.; Aslam, S. A survey on deep learning methods for power load and
renewable energy forecasting in smart microgrids. Renew. Sustain. Energy Rev. 2021, 144, 110992. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.