Distributed Denial of Service Attacks in Cloud Computing based on Deep Learning: A Study

Main Article Content

Mukul Ahirwal,Prof. Puneet Nema ,Dr. Vivek Richhariya

Abstract

Cloud computing has transformed the digital landscape by offering scalable and cost-effective resources. However, its dynamic and shared infrastructure makes it a prime target for cyberattacks, particularly Distributed Denial of Service (DDoS) attacks. These attacks disrupt the availability of services by overwhelming cloud systems with illegitimate traffic from multiple distributed sources. Traditional detection methods often fall short in identifying sophisticated and large-scale DDoS patterns in real time. This study explores the application of deep learning (DL) techniques for detecting and mitigating DDoS attacks in cloud environments. By leveraging models such as Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM) networks, and autoencoders, the research aims to accurately classify malicious traffic patterns and distinguish them from legitimate behavior. A deep learning-based Intrusion Detection System (IDS) is proposed, trained on real-world datasets such as CICDDoS2019 and UNSW-NB15. The experimental results demonstrate that DL models significantly outperform traditional machine learning approaches in terms of accuracy, adaptability, and real-time performance. This study contributes to the advancement of intelligent cloud security systems and highlights the potential of deep learning in building resilient and proactive defense mechanisms against evolving cyber threats in cloud computing.

Article Details

How to Cite
Mukul Ahirwal,Prof. Puneet Nema ,Dr. Vivek Richhariya. (2025). Distributed Denial of Service Attacks in Cloud Computing based on Deep Learning: A Study. International Journal of Advanced Research and Multidisciplinary Trends (IJARMT), 2(3), 28–40. Retrieved from https://www.ijarmt.com/index.php/j/article/view/334
Section
Articles

References

R. P and S. Kamalakkannan, "Deep Learning Model with Optimization Strategies for DDoS Attack Detection in Cloud Computing," 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, 2025, pp. 413-417.

Bakro, M., Kumar, R. R., Husain, M., Ashraf, Z., Ali, A., Yaqoob, S. I., … & Parveen, N. ( 2024 ). Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model. IEEE Access, 2024.

Kumar, S., Dwivedi, M., Kumar, M., & Gill, S. S. ( 2024 ). A comprehensive review of vulnerabilities and AI -enabled defense against DDoS attacks for securing cloud services. Computer Science Review, 53, 100661.

Aliar, A. A. S., Gowri, V., & Abins, A. A. ( 2024 ). Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta-heuristic approach. Transactions on Emerging Telecommunications Technologies, 35 ( 1 ), e4921.

Uddin, R., Kumar, S. A., & Chamola, V. ( 2024 ). Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions. Ad Hoc Networks, 152, 103322.

Han, D., Li, H., Fu, X., & Zhou, S. ( 2024 ). Traffic Feature Selection and Distributed Denial of Service Attack Detection in Software-Defined Networks Based on Machine Learning. Sensors, 24 ( 13 ), 4344.

Rao, G. S., Patra, P. S. K., Narayana, V. A., Reddy, A. R., Reddy, G. V., & Eshwar, D. ( 2024 ). DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment. Egyptian Informatics Journal, 27, 100526.

K. Muthamil Sudar, M. Beulah and P. Deepalakshmi, “Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques”, International Conference on Computer Communication and Informatics (ICCCI), Jan. 27 – 29, 2021, Coimbatore, INDIA.

Muthamil Sudar, K., & Deepalakshmi, P. (2020). A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4. 5 technique. Journal of High Speed Networks, (Preprint), 1- 22.

Dong, S., & Sarem, M. (2019). DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks. IEEE Access, 8, 5039-5048.

Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 7, 80813- 80828.

Gu, Y., Li, K., Guo, Z., & Wang, Y. (2019). Semisupervised K-means DDoS detection method using hybrid feature selection algorithm. IEEE Access, 7, 64351- 64365.

A. Raghavan, F. D. Troia, and M. Stamp, ``Hidden Markov models with random restarts versus boosting for malware detection,'' J. Comput. Virol. Hacking Techn., vol. 15, no. 2, pp. 97107, Jun. 2019.

T. Young, D. Hazarika, S. Poria, and E. Cambria, ``Recent trends in deep learning based natural language processing [review article],'' IEEE Comput. Intell. Mag., vol. 13, no. 3, pp. 5575, Aug. 2018.

X. Lei and Y. Xie, ``Improved XGBoost model based on genetic algorithm for hypertension recipe recognition,'' Comput. Sci, vol. 45, pp. 476481, 2018.

Y. Guo, Y. Liu, A. Oerlemans, S. Lao, S. Wu, and M. S. Lew, ``Deep learning for visual understanding: A review,'' Neurocomputing, vol. 187, pp. 2748, Apr. 2016.

Abduvaliyev, A., Pathan, A.-S. K., Zhou, J., Roman, R., and Wong, W.-C. “On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks”, IEEE Communications Surveys & Tutorials, Vol. 15, Issue 3, pp. no. 1223–1237, 2015.

Abubakar, A. I., Chiroma, H., Muaz, S. A., and Ila, L. B. “A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-driven based Intrusion Detection Systems”, Procedia Computer Science, Vol. 62, pp. no. 221–227, 2015.

Bay, S. D., Kibler, D., Pazzani, M. J., and Smyth, P. (2015), “The UCI KDD archive of Large Data Sets for Data Mining Research and Experimentation”, ACM SIGKDD Explorations Newsletter, Vol. 2, Issue 2, pp. no. 81–85, 2015.

Aburomman, A. A. and Reaz, M. B. I. “A novel SVM-kNN-PSO ensemble method for Intrusion Detection System. Applied Soft Computing”, Vol. 38, pp. no. 360–372, 2015.

Similar Articles

<< < 1 2 3 4 > >> 

You may also start an advanced similarity search for this article.