A Hybrid LSTM-Based Framework for Accurate and Real-Time DDoS Detection in Cloud Environments

Main Article Content

Anjali Saxena, Unmukh Datta

Abstract

This study presents a comprehensive methodology for advanced Distributed Denial of Service (DDoS) detection in cloud-hosted websites using a hybrid approach combining Covariance Matrix Analysis with Machine Learning (ML) and Deep Learning (DL) models. Publicly available datasets, including CIC-IDS2017 serve as the primary data sources, containing both normal and malicious network traffic patterns. Data preprocessing involves cleaning, encoding, and normalization to ensure data quality and consistency, followed by feature extraction to identify critical network attributes such as packet size, session data, and traffic volume. Covariance Matrix Analysis is employed to capture feature interactions and highlight essential trends, aiding in dimensionality reduction and enhancing model interpretability. The proposed hybrid approach leverages ML models like Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Random Forests (RF), alongside DL models such as Convolutional Neural Networks (CNN), to accurately detect DDoS attacks. Comparative analysis evaluates the hybrid model against conventional detection techniques, focusing on false positive rates, detection accuracy, and sensitivity to high-volume, low-rate attacks. Performance metrics, including accuracy, precision, recall, F1-score, and ROC-AUC, assess the model’s effectiveness in real-time attack detection across various traffic scenarios. The expected outcomes include the development of a robust, low-computational overhead DDoS detection model, a structured dataset for attack analysis, and the identification of key network features that significantly impact detection accuracy.

Article Details

How to Cite
Anjali Saxena, Unmukh Datta. (2025). A Hybrid LSTM-Based Framework for Accurate and Real-Time DDoS Detection in Cloud Environments. International Journal of Advanced Research and Multidisciplinary Trends (IJARMT), 2(2), 569–580. Retrieved from https://www.ijarmt.com/index.php/j/article/view/259
Section
Articles

References

A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, “CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System,” IEEE Access, vol. 10, no. September, pp. 99837–99849, 2022, doi: 10.1109/ACCESS.2022.3206425.

S. Wang, W. Xu, and Y. Liu, “Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things,” Comput. Networks, vol. 235, no. April, p. 109982, 2023, doi: 10.1016/j.comnet.2023.109982.

V. Hnamte, H. Nhung-Nguyen, J. Hussain, and Y. Hwa-Kim, “A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE,” IEEE Access, vol. 11, no. April, pp. 37131–37148, 2023, doi: 10.1109/ACCESS.2023.3266979.

D. Kilichev and W. Kim, “Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO,” Mathematics, vol. 11, no. 17, pp. 1–31, 2023, doi: 10.3390/math11173724.

Similar Articles

<< < 2 3 4 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.