An optimized approach for detection and mitigation of DDoS attack cloud using an ensembled deep learning approach
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.25Keywords:
DDoS attack, Cloud computing, Deep learning, SDN, Classifier, Quadratic discriminant.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
As cloud computing gains in popularity, safety becomes an increasingly important consideration. One of the most challenging issues in cloud computing is the detection of Distributed Denial-of-Service (DDoS) attacks (Gupta, B. B., et al., 2009). One of the most crucial aspects of cloud architecture is the ability to provide self-service whenever it is needed. Applications built on the cloud computing model are available on demand and at low cost. As cloud computing grows in popularity, so too is the amount of cyberattacks aimed against it. One such attack is a Distributed Denial of Service attack, which is designed to overload the cloud's hardware/software, resources, and services, making them difficult to use for everyone. The difficulty of this assault stems from the fact that it can overwhelm the victim's ability to communicate or compute in a short amount of time with little to no notice. It's getting harder to spot and stop these assaults as they get more sophisticated and more numerous. Several Machine Learning methods, including Logistic Regression, K-Nearest Neighbors, Support Vector Machine, Decision Tree, Naive Bayes, Multi-layer Perceptron, XGBoost, and SGD have been implemented for accurate DDoS flooding attack detection. When compared to current methods, the suggested strategy of utilizing deep learning with Quadratic discriminant appears to result in higher accuracy. There is also a thorough comparison and evaluation of the abovementioned algorithms with respect to the accuracy measures used.Abstract
How to Cite
Downloads
Similar Articles
- Y. Mohammed Iqbal, M. Mohamed Surputheen, S. Peerbasha, Swarm intelligence-driven HC2NN model for optimized COVID-19 detection using lung imaging , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- T. Malathi, T. Dheepak, Enhanced regression method for weather forecasting , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Elizabeth Mize, A critical analysis of the continuing professional development of teachers in India through the lens of NEP 2020 , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Bhavesh Parekh, Parthiv Patel, Unravelling Indianness in R.K. Narayan’s novels: A multidisciplinary exploration of culture, tradition and modernity , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Akram M. Elias, Rayan S. Hamed, Jiyar M. Naji, The impact of bone substitute combined with blood cell progenerators on the healing of surgical bony defects , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Neha R. Kshatriya, Preeti Nair, Social work students’ views on competencies in human resources , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Sachin V. Chaudhari, Jayamangala Sristi, R. Gopal, M. Amutha, V. Akshaya, Vijayalakshmi P, Optimizing biocompatible materials for personalized medical implants using reinforcement learning and Bayesian strategies , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R. Chandran, J. Selvam, Evaluating the impact of MOOC participation on skill development in autonomous engineering colleges , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- V. Umadevi, S. Ranganathan, IoT based energy aware local approximated MapReduce fuzzy clustering for smart healthcare data transmission , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

