IDEAS home Printed from https://ideas.repec.org/a/bfy/ojtejt/v8y2024i6p28-48id2757.html
   My bibliography  Save this article

Machine Learning-Based Approaches for Detecting and Mitigating Distributed Denial of Service (DDoS) Attacks to Improved Cloud Security

Author

Listed:
  • Navya Vattikonda

  • Anuj Kumar Gupta

  • Achuthananda Reddy Polu

  • Bhumeka Narra

  • Dheeraj Varun Kumar Reddy Buddula

  • Hari Hara Sudheer Patchipulusu

Abstract

Purpose: The research focuses on detecting and mitigating Distributed Denial of Service (DDoS) attacks in cloud environments. It aims to evaluate the effectiveness of machine learning models, particularly the CNN-LSTM hybrid model and the ID3 decision tree, in ensuring cloud security. Materials and Methods: For this study, the CIC-DDoS2019 dataset was used as the primary source of data. The dataset was divided into training and testing sets using an 80:20 split to ensure robust evaluation. Two models were selected for comparison: the CNN-LSTM hybrid model and the ID3 decision tree. The CNN-LSTM model was designed to combine the strengths of convolutional neural networks for spatial feature extraction with long short-term memory networks for sequence learning, while the ID3 decision tree served as a baseline algorithm to evaluate how a simpler, rule-based approach performs against advanced deep learning architectures. Findings: The experimental results showed that the CNN-LSTM hybrid model significantly outperformed the ID3 decision tree method. Specifically, the CNN-LSTM model achieved a recall of 0.97, precision of 0.98, and an F1-score of 0.98, with an overall accuracy of 98.5% in detecting DDoS attacks. Its superior performance can be attributed to its ability to integrate spatial feature extraction and temporal sequence learning effectively. In contrast, the ID3 decision tree model delivered below-average results when compared to the CNN-LSTM, although it remained a usable solution in certain scenarios due to its simplicity and ease of implementation. Unique Contribution to Theory, Practice and Policy: The CNN-LSTM hybrid model emerges as a highly effective solution for DDoS detection in cloud environments and should be prioritized when developing advanced security frameworks. However, decision tree algorithms such as ID3 still hold relevance, especially in resource-constrained environments where computational efficiency and model simplicity are critical considerations.

Suggested Citation

  • Navya Vattikonda & Anuj Kumar Gupta & Achuthananda Reddy Polu & Bhumeka Narra & Dheeraj Varun Kumar Reddy Buddula & Hari Hara Sudheer Patchipulusu, 2024. "Machine Learning-Based Approaches for Detecting and Mitigating Distributed Denial of Service (DDoS) Attacks to Improved Cloud Security," European Journal of Technology, AJPO Journals Limited, vol. 8(6), pages 28-48.
  • Handle: RePEc:bfy:ojtejt:v:8:y:2024:i:6:p:28-48:id:2757
    as

    Download full text from publisher

    File URL: https://ajpojournals.org/journals/EJT/article/view/2757
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;
    ;
    ;
    ;
    ;

    JEL classification:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bfy:ojtejt:v:8:y:2024:i:6:p:28-48:id:2757. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://ajpojournals.org/journals/EJT/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.