A Novel Hybrid Deep Learning Model Integrating Vision Transformer and LSTM for Effective DDOS Detection

Ratnesh Kumar Choudhary*, Mahee Jaiswal**, Lukasha Bagde***, Alok Singh****, Mohd. Fiazan*****, Nitya Sherkar******
*-****** Computer Science and Engineering, S. B. Jain Institute of Technology, Management and Research, Nagpur, Maharashtra, India.
Periodicity:July - September'2025

Abstract

Distributed Denial of Service (DDoS) attacks remain one of the most catastrophic threats within the digital flow of life. They continue to grow in both scale and sophistication within the cybercriminal toolbox. Regardless of whether the DDoS attacks are carried out by cybercriminals, cyberterrorists, or other malicious actors, their impact remains significant. DDoS attacks destroy the reliability and availability of online services, of which IoTs and cloud infrastructures are subject to much greater risk than previous methods. A hybrid deep learning method is proposed in this study that implements a Vision Transformer (ViT) combined with Long Short-Term Memory (LSTM) networks that can learn spatial representations from the ViT and temporal patterns from the LSTM for the purpose of being able to cope with the numerous IoT cyber risks that continue to surface within the modern online environment. Solutions to class imbalance are used by the SMOTE Borderline technique to improve the occurrence of the minority class and therefore improve the robustness of classification. The model is evaluated against the CICIDS2017 dataset, a realistic benchmark for benign and malicious attacks. The experimental results demonstrate the ViT+LSTM framework achieves a very high accuracy of 99.78%, providing robust resiliency from the class imbalance of the data.

Keywords

ViT, SMOTE- Borderline, Class imbalance, CICIDS2017 dataset, Hybrid Model.

How to Cite this Article?

Choudhary, R. K., Jaiswal, M., Bagde, L., Singh, A., Fiazan, M., and Sherkar, N. (2025). A Novel Hybrid Deep Learning Model Integrating Vision Transformer and LSTM for Effective DDOS Detection. i-manager’s Journal on Software Engineering, 20(1), 13-19.

References

If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 15 15 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.