Open Access iconOpen Access

ARTICLE

Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique

Chin-Shiuh Shieh1, Thanh-Lam Nguyen1, Thanh-Tuan Nguyen2,*, Mong-Fong Horng1,*

1 Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung, 807618, Taiwan
2 Department of Electronic and Automation Engineering, Nha Trang University, Nha Trang, 650000, Vietnam

* Corresponding Authors: Thanh-Tuan Nguyen. Email: email; Mong-Fong Horng. Email: email

(This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)

Computers, Materials & Continua 2025, 82(3), 4881-4912. https://doi.org/10.32604/cmc.2025.061001

Abstract

DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity, capable of crippling critical infrastructures and disrupting services globally. As networks continue to expand and threats become more sophisticated, there is an urgent need for Intrusion Detection Systems (IDS) capable of handling these challenges effectively. Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics. This paper presents a novel approach for detecting unknown Distributed Denial of Service (DDoS) attacks by integrating Sliced Iterative Normalizing Flows (SINF) into IDS. SINF utilizes the Sliced Wasserstein distance to repeatedly modify probability distributions, enabling better management of high-dimensional data when there are only a few samples available. The unique architecture of SINF ensures efficient density estimation and robust sample generation, enabling IDS to adapt dynamically to emerging threats without relying heavily on predefined signatures or extensive retraining. By incorporating Open-Set Recognition (OSR) techniques, this method improves the system’s ability to detect both known and unknown attacks while maintaining high detection performance. The experimental evaluation on CICIDS2017 and CICDDoS2019 datasets demonstrates that the proposed system achieves an accuracy of 99.85% for known attacks and an F1 score of 99.99% after incremental learning for unknown attacks. The results clearly demonstrate the system’s strong generalization capability across unseen attacks while maintaining the computational efficiency required for real-world deployment.

Keywords


Cite This Article

APA Style
Shieh, C., Nguyen, T., Nguyen, T., Horng, M. (2025). Unknown ddos attack detection with sliced iterative normalizing flows technique. Computers, Materials & Continua, 82(3), 4881–4912. https://doi.org/10.32604/cmc.2025.061001
Vancouver Style
Shieh C, Nguyen T, Nguyen T, Horng M. Unknown ddos attack detection with sliced iterative normalizing flows technique. Comput Mater Contin. 2025;82(3):4881–4912. https://doi.org/10.32604/cmc.2025.061001
IEEE Style
C. Shieh, T. Nguyen, T. Nguyen, and M. Horng, “Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique,” Comput. Mater. Contin., vol. 82, no. 3, pp. 4881–4912, 2025. https://doi.org/10.32604/cmc.2025.061001



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 63

    View

  • 89

    Download

  • 0

    Like

Share Link