Research Article

ML-DDoSnet: IoT Intrusion Detection Based on Denial-of-Service Attacks Using Machine Learning Methods and NSL-KDD

Figure 3

The architecture of the LSTM and BiLSTM methods.
(a) LSTM
(b) BiLSTM