An optimized approach for detection and mitigation of DDoS attack cloud using an ensembled deep learning approach
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.25Keywords:
DDoS attack, Cloud computing, Deep learning, SDN, Classifier, Quadratic discriminant.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
As cloud computing gains in popularity, safety becomes an increasingly important consideration. One of the most challenging issues in cloud computing is the detection of Distributed Denial-of-Service (DDoS) attacks (Gupta, B. B., et al., 2009). One of the most crucial aspects of cloud architecture is the ability to provide self-service whenever it is needed. Applications built on the cloud computing model are available on demand and at low cost. As cloud computing grows in popularity, so too is the amount of cyberattacks aimed against it. One such attack is a Distributed Denial of Service attack, which is designed to overload the cloud's hardware/software, resources, and services, making them difficult to use for everyone. The difficulty of this assault stems from the fact that it can overwhelm the victim's ability to communicate or compute in a short amount of time with little to no notice. It's getting harder to spot and stop these assaults as they get more sophisticated and more numerous. Several Machine Learning methods, including Logistic Regression, K-Nearest Neighbors, Support Vector Machine, Decision Tree, Naive Bayes, Multi-layer Perceptron, XGBoost, and SGD have been implemented for accurate DDoS flooding attack detection. When compared to current methods, the suggested strategy of utilizing deep learning with Quadratic discriminant appears to result in higher accuracy. There is also a thorough comparison and evaluation of the abovementioned algorithms with respect to the accuracy measures used.Abstract
How to Cite
Downloads
Similar Articles
- Ganga Gudi, Mallamma V Reddy, Hanumanthappa M, Enhancing Kannada text-to-speech and braille conversion with deep learning for the visually impaired , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- Shaik Abdulla P., Abdul Razak T., Retrieval-Based Inception V3-Net Algorithm and Invariant Data Classification using Enhanced Deep Belief Networks for Content-Based Image Retrieval , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ETTG: Enhanced token and tag generation for authenticating users and deduplicating data stored in public cloud storage , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Hemamalini V., Victoria Priscilla C, Deep learning driven image steganalysis approach with the impact of dilation rate using DDS_SE-net on diverse datasets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- S. Vanaja, Hari Ganesh S, Application of data mining and machine learning approaches in the prediction of heart disease – A literature survey , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Dileep Pulugu, Shaik K. Ahamed, Senthil Vadivu, Nisarg Gandhewar, U D Prasan, S. Koteswari, Empowering healthcare with NLP-driven deep learning unveiling biomedical materials through text mining , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Ritu Nagila, Abhishek Kumar Mishra, Ashish Nagila, Role of big data in enhancing lung cancer prediction and treatment , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Muhammed Jouhar K. K., Dr. K. Aravinthan, An improved social media behavioral analysis using deep learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- N. Ruba, A. S. A. Khadir, Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- K. Arunkumar, K. R. Shanthy, S. Lakshmisridevi, K. Thilagam, FR-CNN: The optimal method for slicing fifth-generation networks through the application of deep learning , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
<< < 3 4 5 6 7 8 9 10 11 12 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- V. Umadevi, S. Ranganathan, IoT based energy aware local approximated MapReduce fuzzy clustering for smart healthcare data transmission , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

