Systematic Review of Supervised Learning Models for Network Flood Detection (NFD): Trends, Performance Evaluation, and Implementation Insights

Roni Habibi, Naufal Dekha Widana

Abstract


Due to the growing volume, speed, and sophistication of malicious traffic, Network Flood Detection (NFD), especially in the context of Distributed Denial of Service (DDoS) assaults, continues to be a crucial challenge in contemporary network security.  Supervised machine learning has been widely used to enhance the precision, scalability, and real-time detection capabilities of NFD systems.  However, current research reveals inconsistent results on the optimal supervised learning algorithm, mostly because of differences in datasets, feature engineering methods, assessment criteria, and deployment settings.  In order to assess supervised learning models applied to NFD, this study intends to do a Systematic Literature Review (SLR) utilizing the PRISMA framework. A structured search was performed via Scopus, IEEE Xplore, SpringerLink, and ScienceDirect, encompassing papers from 2019 to 2025.  40 primary papers and 16 additional articles were found to be appropriate for synthesis after an initial dataset of 516 research was reviewed using predetermined inclusion and exclusion criteria.  Algorithms, datasets, evaluation criteria, feature selection techniques, and deployment characteristics were all incorporated in the data extraction process. According to the review, models like Random Forest, XGBoost, K-Nearest Neighbor, and Support Vector Machine regularly perform well, with accuracy ranging from 92% to 99%, depending on preprocessing methods and dataset features.  Common problems highlighted include dataset imbalance, lack of real-time adaptation, and insufficient generalization to unforeseen assault types. The results show that supervised learning is still a promising method for NFD, particularly when combined with balanced datasets, hybrid or ensemble model techniques, and optimized feature engineering.  To increase real-time resilience against changing network threats, further research is urged to incorporate deep learning, lightweight edge models, and adaptive learning frameworks.


Keywords


Network; Machine learning; SLR; DDoS; Supervised Learning;

Full Text:

Link Download

References


Al-fuhaidi, Belal, Zainab Farae, Farouk Al-fahaidy, Gawed Nagi, Abdullatif Ghallab, and Abdu Alameri. 2024. “Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning Algorithms” 2024. https://doi.org/10.1155/2024/2625922.

Alhalabi, Wadee, Immersive Virtual, Saudi Arabia, Akshat Gaurav, Varsha Arya, Immersive Virtual, Saudi Arabia, et al. n.d. “Machine Learning-Based Distributed Denial of Services ( DDoS ) Attack Detection in Intelligent Information Systems” 19 (1): 1–17. https://doi.org/10.4018/IJSWIS.327280.

Aljably, Randa, Yuan Tian, and Mznah Al-rodhaan. 2020. “Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection” 2020. https://doi.org/10.1155/2020/5874935.

Almorabea, Omar Mohammed, Tariq Jamil Saifullah Khanzada, Muhammad Ahtisham Aslam, Fatheah Ahmad Hendi, and Ahmad Mohammed Almorabea. 2023. “IoT Network-Based Intrusion Detection Framework: A Solution to Process Ping Floods Originating from Embedded Devices.” IEEE Access 11 (October): 119118–45. https://doi.org/10.1109/ACCESS.2023.3327061.

AlShaikh, Muath, Yasser Alrajeh, Sultan Alamri, Suhib Melhem, and Ahmed Abu-Khadrah. 2025. “Supervised Methods of Machine Learning for Email Classification: A Literature Survey.” Systems Science and Control Engineering 13 (1). https://doi.org/10.1080/21642583.2025.2474450.

Altayef, Ehsan, Fateh Anayi, M. Packianather, Youcef Benmahamed, and Omar Kherif. 2022. “Detection and Classification of Lamination Faults in a 15 KVA Three-Phase Transformer Core Using SVM, KNN and DT Algorithms.” IEEE Access 10:50925–32. https://doi.org/10.1109/ACCESS.2022.3174359.

Anbar, Mohammed. 2020. “ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques , Open Challenges , and Blockchain Applicability : A Review” 8. https://doi.org/10.1109/ACCESS.2020.3022963.

Aytaç, Tuğba, Muhammed Ali Aydın, and Abdül Halim Zaim. 2020. “Detection DDOS Attacks Using Machine Learning Methods” 20 (2): 159–67. https://doi.org/10.5152/electrica.2020.20049.

Birant, Kokten Ulas. 2023. “Semi-Supervised k-Star (SSS): A Machine Learning Method with a Novel Holo-Training Approach.” Entropy 25 (1). https://doi.org/10.3390/e25010149.

Cerdà-alabern, Llorenç, Gabriel Iuhasz, and Gabriele Gemmi. 2023. “Anomaly Detection for Fault Detection in Wireless Community Networks Using Machine Learning.” Computer Communications 202 (September 2022): 191–203. https://doi.org/10.1016/j.comcom.2023.02.019.

Çevik, Nurşah, and Sedat Akleylek. 2024. “SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast.” IEEE Access 12 (March): 35643–62. https://doi.org/10.1109/ACCESS.2024.3369181.

Chandio, Sadullah, Javed Ahmed Laghari, Senior Member, Muhammad Akram Bhayo, Mohsin A L I Koondhar, Yun-su Kim, Senior Member, Besma Bechir Graba, and Ezzeddine Touti. 2024. “Machine Learning-Based Multiclass Anomaly Detection and Classification in Hybrid Active Distribution Networks.” IEEE Access 12 (September): 120131–41. https://doi.org/10.1109/ACCESS.2024.3445287.

Farkas, Karoly. 2023. “AREP : An Adaptive , Machine Learning-Based Algorithm for Real-Time Anomaly Detection on Network Telemetry Data Pivotal to Understand the Details of Complex Processes And.” Neural Computing and Applications 35 (8): 6079–94. https://doi.org/10.1007/s00521-022-08000-y.

Fatriansyah, Jaka Fajar, Elvi Kustiyah, Siti Norasmah Surip, Andreas Federico, Agrin Febrian Pradana, Aniek Sri Handayani, Mariatti Jaafar, and Donanta Dhaneswara. 2023. “Fine-Tuning Optimization of Poly Lactic Acid Impact Strength with Variation of Plasticizer Using Simple Supervised Machine Learning Methods.” Express Polymer Letters 17 (9): 964–73. https://doi.org/10.3144/expresspolymlett.2023.71.

Hai, Tran Hoang, Le Huy Hoang, and Eui-nam Huh. 2020. “N ETWORK A NOMALY D ETECTION B ASED ON L ATE F USION OF S EVERAL M ACHINE” 12 (6): 117–31. https://doi.org/10.5121/ijcnc.2020.12608.

Halder, Rajib Kumar, Mohammed Nasir Uddin, Md Ashraf Uddin, Sunil Aryal, and Ansam Khraisat. 2024. “Enhancing K-Nearest Neighbor Algorithm: A Comprehensive Review and Performance Analysis of Modifications.” Journal of Big Data 11 (1). https://doi.org/10.1186/s40537-024-00973-y.

Kamamura, Shohei, Yuki Takei, Masato Nishiguchi, Yuhei Hayashi, and Takayuki Fujiwara. 2023. “Network Anomaly Detection Through IP Traffic Analysis With Variable Granularity.” IEEE Access 11 (October): 129818–28. https://doi.org/10.1109/ACCESS.2023.3334212.

Katherine, Maria, Plazas Olaya, Jaime Alberto, Vergara Tejada, Jose Edinson, and Aedo Cobo. 2024. “Securing Microservices-Based IoT Networks : Real-Time Anomaly Detection Using Machine Learning” 2024. https://doi.org/10.1155/2024/9281529.

Khalid, Waqar, Naveed Ahmed, Muhammad Khalid, Aziz Ud Din, Aurangzeb Khan, and Muhammad Arshad. 2019. “FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks.” IEEE Access 7:83740–60. https://doi.org/10.1109/ACCESS.2019.2924587.

Kumar, Sudesh, and Sunanda Gupta. 2025. “SDN TCP-SYN Dataset: A Dataset for TCP-SYN Flood DDoS Attack Detection in Software-Defined Networks.” Data in Brief 59:111314. https://doi.org/10.1016/j.dib.2025.111314.

Li, Rongrong. 2024. “Applied Mathematics and Nonlinear Sciences” 9 (1): 1–16.

Locatelli, Pierluigi, Massimo Perri, Daniel Mauricio, Jimenez Gutierrez, Andrea Lacava, and Francesca Cuomo. 2023. “Device Discovery and Tracing in the Bluetooth Low Energy Domain.” Computer Communications 202 (September 2022): 42–56. https://doi.org/10.1016/j.comcom.2023.02.008.

Lu, Yutao, Juan Wang, Miao Liu, Kaixuan Zhang, Guan Gui, Tomoaki Ohtsuki, and Fumiyuki Adachi. 2020. “Semi-Supervised Machine Learning Aided Anomaly Detection Method in Cellular Networks.” IEEE Transactions on Vehicular Technology 69 (8): 8459–67. https://doi.org/10.1109/TVT.2020.2995160.

Micro-grid, Smart. 2023. “Quantum Computing and Machine Learning for Cybersecurity : Distributed Denial of Service ( DDoS ) Attack Detection On.”

Ndichu, Samuel, Sylvester McOyowo, Henry Okoyo, and Cyrus Wekesa. 2023. “Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods.” International Journal of Computer Network and Information Security 15 (2): 48–61. https://doi.org/10.5815/ijcnis.2023.02.04.

Networks, Communication. 2023. “Retracted : Detection of DDoS Attack within Industrial IoT” 2022. https://doi.org/10.1155/2022/1401683.

Networks, In-vehicle, Asma Alfardus, and Danda B Rawat. 2024. “Machine Learning-Based Anomaly Detection for Securing.”

Park, Seunghyun, and Jin Young Choi. 2020. “Hierarchical Anomaly Detection Model for In-Vehicle Networks Using Machine Learning Algorithms.” Sensors (Switzerland) 20 (14): 1–21. https://doi.org/10.3390/s20143934.

Patel, Pragati, Sivarenjani B, and Ramesh Naidu Annavarapu. 2025. “Application of Supervised Machine Learning Models in Human Emotion Classification Using Tsallis Entropy as a Feature.” Journal of Big Data 12 (1). https://doi.org/10.1186/s40537-025-01177-8.

Popoola, Anjolaoluwa Ayomide, Jennifer Koren Frediani, Terryl Johnson Hartman, and Kamran Paynabar. 2023. “Mitigating Underreported Error in Food Frequency Questionnaire Data Using a Supervised Machine Learning Method and Error Adjustment Algorithm.” BMC Medical Informatics and Decision Making 23 (1): 1–11. https://doi.org/10.1186/s12911-023-02262-9.

Puttinaovarat, Supattra, and Paramate Horkaew. 2020. “Flood Forecasting System Based on Integrated Big and Crowdsource Data by Using Machine Learning Techniques.” IEEE Access 8:5885–5905. https://doi.org/10.1109/ACCESS.2019.2963819.

Radhika, S., K. Anitha, C. Kavitha, Wen Cheng Lai, and S. R. Srividhya. 2023. “Detection of Hello Flood Attacks Using Fuzzy-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks.” Electronics (Switzerland) 12 (1). https://doi.org/10.3390/electronics12010123.

Rafique, Saida Hafsa, Amira Abdallah, Nura Shifa Musa, and Thangavel Murugan. 2024. “Things Network Anomaly Detection — Current Research Trends.”

Saeed, Mamoon M, Rashid A Saeed, Maha Abdelhaq, Raed Alsaqour, and Mohammad Kamrul Hasan. 2023. “Anomaly Detection in 6G Networks Using Machine.”

Sangodoyin, Abimbola O., Mobayode O. Akinsolu, Prashant Pillai, and Vic Grout. 2021. “Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning.” IEEE Access 9:122495–508. https://doi.org/10.1109/ACCESS.2021.3109490.

Shaik, Riyaaz Uddien, Aiswarya Unni, and Weiping Zeng. 2022. “Quantum Based Pseudo-Labelling for Hyperspectral Imagery: A Simple and Efficient Semi-Supervised Learning Method for Machine Learning Classifiers.” Remote Sensing 14 (22). https://doi.org/10.3390/rs14225774.

Shajari, Mehdi, Hongxiang Geng, Kaixuan Hu, and Alberto Leon-Garcia. 2022. “Tensor-Based Online Network Anomaly Detection and Diagnosis.” IEEE Access 10 (August): 85792–817. https://doi.org/10.1109/ACCESS.2022.3197651.

Ullah, Imtiaz, and Qusay H. Mahmoud. 2021. “A Framework for Anomaly Detection in IoT Networks Using Conditional Generative Adversarial Networks.” IEEE Access 9:165907–31. https://doi.org/10.1109/ACCESS.2021.3132127.

Wang, Fajing, and Xu Feng. 2025. “Flood Change Detection Model Based on an Improved U-Net Network and Multi-Head Attention Mechanism.” Scientific Reports 15 (1): 1–16. https://doi.org/10.1038/s41598-025-87851-6.

Wang, Song, Juan Fernando Balarezo, Sithamparanathan Kandeepan, Akram Al-Hourani, Karina Gomez Chavez, and Benjamin Rubinstein. 2021. “Machine Learning in Network Anomaly Detection: A Survey.” IEEE Access 9:152379–96. https://doi.org/10.1109/ACCESS.2021.3126834.

Wang, Zhimin, Lingli Zhao, Nan Jiang, Weidong Sun, Jie Yang, Lei Shi, Hongtao Shi, and Pingxiang Li. 2025. “DMCF-Net: Dilated Multi-Scale Context Fusion Network for SAR Flood Detection.” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing PP:1–12. https://doi.org/10.1109/JSTARS.2025.3584282.

Yi, Junkai, and Yongbo Tian. 2024. “Insider Threat Detection Model Enhancement Using Hybrid Algorithms between Unsupervised and Supervised Learning.” Electronics (Switzerland) 13 (5). https://doi.org/10.3390/electronics13050973.

Zhang, Shichao. 2022. “Challenges in KNN Classification.” IEEE Transactions on Knowledge and Data Engineering 34 (10): 4663–75. https://doi.org/10.1109/TKDE.2021.3049250.




DOI: http://dx.doi.org/10.35671/telematika.v18i2.3183

Refbacks

  • There are currently no refbacks.


 



Indexed by:

   

Telematika
ISSN: 2442-4528 (online) | ISSN: 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto, Indonesia


Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License .