<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="nlm-ta">REA Press</journal-id>
      <journal-id journal-id-type="publisher-id">Null</journal-id>
      <journal-title>REA Press</journal-title><issn pub-type="ppub">3042-3104</issn><issn pub-type="epub">3042-3104</issn><publisher>
      	<publisher-name>REA Press</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">https://doi.org/10.48314/apem.v2i2.33</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group><subject>Internet of things, Traffic classification, Supervised learning, Distributed denial-of-service attack,  Internet of things-23.</subject></subj-group>
      </article-categories>
      <title-group>
        <article-title>A Fast Internet of Things DDoS Attack Detection Method Using Deep Feedforward Networks</article-title><subtitle>A Fast Internet of Things DDoS Attack Detection Method Using Deep Feedforward Networks</subtitle></title-group>
      <contrib-group><contrib contrib-type="author">
	<name name-style="western">
	<surname>Babaiyan</surname>
		<given-names>Vahide </given-names>
	</name>
	<aff>Computer Engineering and IT Department, Faculty of Electrical and Computer Engineering, Shiraz University of Technology, Shiraz, Iran.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Bushehrian</surname>
		<given-names>Omid </given-names>
	</name>
	<aff>Computer Engineering and IT Department, Faculty of Electrical and Computer Engineering, Shiraz University of Technology, Shiraz, Iran.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Javidan</surname>
		<given-names>Reza </given-names>
	</name>
	<aff>Computer Engineering and IT Department, Faculty of Electrical and Computer Engineering, Shiraz University of Technology, Shiraz, Iran.</aff>
	</contrib></contrib-group>		
      <pub-date pub-type="ppub">
        <month>05</month>
        <year>2025</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>13</day>
        <month>05</month>
        <year>2025</year>
      </pub-date>
      <volume>2</volume>
      <issue>2</issue>
      <permissions>
        <copyright-statement>© 2025 REA Press</copyright-statement>
        <copyright-year>2025</copyright-year>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.5/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</p></license>
      </permissions>
      <related-article related-article-type="companion" vol="2" page="e235" id="RA1" ext-link-type="pmc">
			<article-title>A Fast Internet of Things DDoS Attack Detection Method Using Deep Feedforward Networks</article-title>
      </related-article>
	  <abstract abstract-type="toc">
		<p>
			The increasing use of Internet of Things (IoT) devices has led to a surge in data traffic, which can be vulnerable to intentional denial-of-service (DoS) attacks that disrupt the intended Quality of Service (QoS). This paper presents a deep learning-based approach using Feedforward Neural Networks (FNNs) to detect Distributed Denial-of-Service (DDoS) attacks in IoT networks. We evaluated the performance of this approach on the IoT-23 dataset, which included captures of both malware-infected and benign IoT traffic. We conducted a comparative analysis between the FNN approach and three commonly used Machine Learning (ML) models, namely, Support Vector Machines (SVM), Random Forests (RFs), and Gradient Boosting (GRB). Our findings demonstrate that all methods achieve similar levels of accuracy. However, the FNN model distinguishes itself with significantly higher precision than the other models. Furthermore, our analysis revealed that FNN exhibits the shortest learning time among the considered models.	
		</p>
		</abstract>
    </article-meta>
  </front>
  <body></body>
  <back>
    <ack>
      <p>Null</p>
    </ack>
  </back>
</article>