Enhancing Cloud Service Performance by Mitigating DDoSAttacks with Multilevel Time-Oriented Analysis
-
https://doi.org/10.14419/0g6p7166
Received date: July 15, 2025
Accepted date: July 24, 2025
Published date: November 1, 2025
-
Multilevel Time-Oriented Analysis; Service Performance; Trust Verification; Service History Monitoring; DDoS Detection; Malicious Requests -
Abstract
In many organizations, cloud computing is becoming increasingly common. Distributed Denial of Service (DDoS) attacks are a concern that can be mitigated in several ways, but they have a noticeable impact on service performance. Most methods perform trust verification only at the initial stage, but malicious activities often occur at the middle or end stage. It highly affects the service performance of the user, and it should be monitored and stopped initially. A Multilevel Time Oriented Analysis (MLTOA) is performed to identify such malicious requests. The high-threat service is determined by tracking the service history in different states. Using the MLTOA scheme, the service history can be grouped into other states, and the user service break that occurs in any state can be identified. Then the method backtracks two states: one is the initial state of the request, and the second is how the malicious user starts the service request. Thus, detecting DDoS attacks can be performed efficiently by monitoring such states and deciding whether they are malicious or genuine. Therefore, the method does not allow the user to access the service. DDoS detection accuracy increases dramatically with the proposed method, reduced time complexity, and improved service utilization.
-
References
- Y. Xiang, K. Li, and W. Zhou, “Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426-437, 2011.Article (CrossRef Link) https://doi.org/10.1109/TIFS.2011.2107320.
- Srikanth Kandula, Dina Katabi and Matthias Jacob Arthur Berger, “Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds,” in Proc. 2nd conference on Symposium on Networked Systems Design and Implementation, pp. 287–300, 2005.Article (CrossRef Link).
- B. Dhiyanesh and S. Sakthivel, “F2C: An Novel Distributed Denial of Service Attack Mitigation Model for Saas Cloud Environment,” Asian Jour-nal of Research in Social Sciences and Humanities, vol. 6, pp. 192-203, 2016. Article (CrossRef Link) https://doi.org/10.5958/2249-7315.2016.00389.0.
- Q. He, J. Yan, Y. Yang, R. Kowalczyk, and H. Jin, “A Decentralized Service Discovery Approach on Peer-to-Peer Networks,” IEEE Transactions on Services Computing, vol. 6, no. 1, pp. 64-75, 2013. Article (CrossRef Link) https://doi.org/10.1109/TSC.2011.31.
- X. Wang, L. Liu, and J. Su, “RLM: A General Model for Trust Representation and Aggregation,” IEEE Transactions on Services Computing, vol. 5, no. 1, pp. 131-143, 2012. Article (CrossRef Link) https://doi.org/10.1109/TSC.2010.56.
- Dhiyanesh B and Sakthivel S, “UBP-Trust: User Behavioral Pattern Based Secure Trust Model for Mitigating Denial of Service Attacks in Soft-ware as a Service (SaaS) Cloud Environment,” Journal of Computational and Theoretical Nanoscience, vol. 13, pp. 7649-7654, 2016. Article (CrossRef Link) https://doi.org/10.1166/jctn.2016.5766.
- Mohammed A. AlZain, Eric Pardede, Ben Soh, and James A. Thom, “Cloud Computing Security: From Single to Multi-clouds,” in Proc. 45th Ha-waii International Conference on System Sciences, pp. 5490-5499, 2012.Article (CrossRef Link) https://doi.org/10.1109/HICSS.2012.153.
- Li, Xiaohui, Jingsha He, and Ting Zhang, “A service-oriented identity authentication privacy protection method in cloud computing,” International Journal of Grid and Distributed Computing, vol. 6, no. 1, pp. 77-86, 2013.Article (CrossRef Link).
- S. Kasthuripriya, B. Dhiyanesh, and S. Sakthivel, “LFTSM-Local Flow Trust Based Service Monitoring Approach for Preventing the Packet During Data Transfer in Cloud,” Asian Journal of Information Technology” vol. 15, no. 20, pp. 3927-3931, 2016.Article (CrossRef Link).
- J. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau, “Security and Privacy-Enhancing Multicloud Architectures,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 212-224, 2013. Article (CrossRef Link) https://doi.org/10.1109/TDSC.2013.6.
- Nikolaos Pitropakis, Dimitra Anastasopoulou, Aggelos Pikrakis, and Costas Lambrinoudakis, “If you want to know about a hunter, study his prey: detection of network-based attacks on KVM based cloud environments,” Journal of Cloud Computing, vol. 3, no. 20, 2014. Article (CrossRef Link) https://doi.org/10.1186/s13677-014-0020-6.
- S. Sakthivel and B. Dhiyanesh, “Secure Data Storage Auditing Service Using Third Party Auditor In Cloud Computing,” International Journal of Applied Engineering Research, vol. 10, no. 37, 2015.Article (CrossRef Link).
- Somesh Kumar Prajapati, Suvamoy Changder, and Anirban Sarkar, “Trust Management Model for Cloud Computing Environment,” ICTACT Journal on Soft Computing, vol. 3, no. 3, pp. 509-513, 2013.Article (CrossRef Link). https://doi.org/10.21917/ijsc.2013.0076.
- Yamato Y, “Automatic verification technology of software patches for user virtual environments on IaaS cloud,” Journal of Cloud Computing,vol. 4, no. 4, 2015. Article (CrossRef Link) https://doi.org/10.1186/s13677-015-0028-6.
- S. Sakthivel and B. Dhiyanesh, “A privacy-preserving storage security for spatial data in dynamics cloud environment,” in Proc. Fourth Internation-al Conference on Computing, Communications and Networking Technologies, pp. 1-6, 2013.Article (CrossRef Link) https://doi.org/10.1109/ICCCNT.2013.6726759.
- Sahi, D. Lai, Y. Li and M. Diykh, "An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment," IEEE Ac-cess, vol. 5, pp. 6036-6048, 2017. Article (CrossRef Link) https://doi.org/10.1109/ACCESS.2017.2688460.
- Aljuhani, "Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments,"IEEE Ac-cess, vol. 9, pp. 42236-42264, 2021.Article (CrossRef Link) https://doi.org/10.1109/ACCESS.2021.3062909.
- Bhardwaj, V. Mangat, and R. Vig, "Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud," IEEE Access, vol. 8, pp. 181916-181929, 2020.Article (CrossRef Link) https://doi.org/10.1109/ACCESS.2020.3028690.
- S. Kautish, R. A and A. Vidyarthi, "SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environ-ment,"IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6455-6463, Sept. 2022.Article (CrossRef Link) https://doi.org/10.1109/TII.2022.3146290.
- M. Nadeem, A. Arshad, S. Riaz, S. S. Band, and A. Mosavi, "Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion De-tection and Prevention System," IEEE Access, vol. 9, pp. 152300-152309, 2021.Article (CrossRef Link) https://doi.org/10.1109/ACCESS.2021.3126535.
- O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, "Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud," IEEE Transactions on Services Computing, vol. 13, no. 1, pp. 114-129, 2020.Article (CrossRef Link) https://doi.org/10.1109/TSC.2017.2694426.
- N. Agrawal and S. Tapaswi, "Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges," IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3769-3795.Article (CrossRef Link) https://doi.org/10.1109/COMST.2019.2934468.
- D. Erhan and E. Anarim,"Hybrid DDoS Detection Framework Using Matching Pursuit Algorithm,"IEEE Access, vol. 8, pp. 118912-118923, 2020.Article (CrossRef Link) https://doi.org/10.1109/ACCESS.2020.3005781.
- Alsirhani, S. Sampalli, and P. Bodorik, "DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark," IEEE Transactions on Network and Service Management, vol. 16, no. 3, pp. 936-949, 2019.Article (CrossRef Link) https://doi.org/10.1109/TNSM.2019.2929425.
- Nayak, A. (2024). Bio-inspired edge intelligence: Neuromorphic architectures for real-time biomedical signal classification. Electronics, Communi-cations, and Computing Summit, 2(4), 32–41.
- Rahim, R. (2025). AI-Driven Fault Diagnosis in Three-Phase Induction Motors Using Vibration and Thermal Data. National Journal of Electrical Machines & Power Conversion, 21-28.
- Romano, G., & Conti, A. (2024). The role of Customer Feedback Loops in driving Continuous Innovation and Quality Improvement. National Journal of Quality, Innovation, and Business Excellence, 1(2), 30-39.
- Martínez, G. (2024). Cultural Heritage Tourism: Balancing Preservation with Visitor Experience. Journal of Tourism, Culture, and Management Studies, 1(2), 17-27.
- Ramchurn, R. (2025). Advancing autonomous vehicle technology: Embedded systems prototyping and validation. SCCTS Journal of Embedded Systems Design and Applications, 2(2), 56–64.
- Manaa Barhoumi, E., Charabi, Y., & Farhani, S. (2023). FPGA Application: Realization of IIR Filter Based Architecture. Journal of VLSI Circuits and Systems, 5(2), 29–35. https://doi.org/10.31838/jvcs/05.02.05
- Karthika, J. (2025). Sparse signal recovery via reinforcement-learned basis selection in wireless sensor networks. National Journal of Signal and Im-age Processing, 1(1), 44–51.
- Kavitha, M. (2025). Deep learning-based channel estimation for massive MIMO systems. National Journal of RF Circuits and Wireless Systems, 2(2), 1–7.
- Veerappan, S. (2025). Harmonic feature extraction and deep fusion networks for music genre classification. National Journal of Speech and Audio Processing, 1(1), 37–44.
- Sadulla, S. (2025). IoT-enabled smart buildings: A sustainable approach for energy management. National Journal of Electrical Electronics and Au-tomation Technologies, 1(1), 14–23.
-
Downloads
-
How to Cite
B, D. ., R, D. ., N, S., S, D. M. R. ., & V, J. . (2025). Enhancing Cloud Service Performance by Mitigating DDoSAttacks with Multilevel Time-Oriented Analysis. International Journal of Basic and Applied Sciences, 14(SI-1), 585-593. https://doi.org/10.14419/0g6p7166
