Abstract

The term "cloud computing" describes a method of providing hardware- and software-based services over the internet. This allows users to access their data and apps from any device. The benefits of cloud computing include scalability, virtualization, access to user assets, lower infrastructure costs, and flexibility. However, one drawback is that it is susceptible to distributed denial of service attacks, which occur when multiple computer systems collaborate to target a particular resource, website, or server. Distributed denial of service (DDoS) attacks present a serious risk to computer networks and constitute a major cyber security challenge. This results in a denial of service for end users, as a result of false connection requests, a flood of messages, and twisted packets causing the system to slow down or even crash. Real people and services cannot access cloud computing. The issue of machine learning algorithms for identifying distributed denial of service (DDoS) attacks is explored in this article. In order to identify and defend cloud systems from harmful assaults, we developed a new machine learning approach in this work that is based on transfer learning. This study offers NSL-KDD datasets and two methodologies. There are two types of filters available: the Learning Vector Quantization (LVQ) Filters and the Principal Component Analysis (PCA) method, which reduces dimensionality. The features selected from each method were pooled using Decision Tree (DT), Naïve Bayes (NB), and Support Vector Machine (SVM) to detect distributed denial of service attacks (DDoS). We contrasted the results of several classifications. In terms of attack detection, LVQ-based DT performed better results as compared to other methods.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.