The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

DOI: 10.14569/IJACSA.2022.0131059
PDF

Mitigation of DDoS Attack in Cloud Computing Domain by Integrating the DCLB Algorithm with Fuzzy Logic

Author 1: Amrutha Muralidharan Nair
Author 2: R Santhosh

International Journal of Advanced Computer Science and Applications(IJACSA), Volume 13 Issue 10, 2022.

  • Abstract and Keywords
  • How to Cite this Article
  • {} BibTeX Source

Abstract: Cloud computing would be an easy method to obtain services, resources and applications from any location on the internet. In the future of data generation, it is an unavoidable conclusion. Despite its many attractive properties, the cloud is vulnerable to a variety of attacks. One such well-known attack that emphasizes the availability of amenities is the Distributed Denial of Service (DDoS). A DDoS assault overwhelms the server with massive quantities of regular or intermittent traffic. It compromises with the cloud servers’ services and makes it harder to reply to legitimate users of the cloud. A monitoring system with correct resource scaling approach should be created to regulate and monitor the DDoS assault. The network is overwhelmed with excessive traffic of significant resource usage requests during the attack, resulting in the denial of needed services to genuine users. In this research, a unique way to the analyze resources used by the cloud users, lowering of the resources consumed is done when the network is overburdened with excessive traffic, and the dynamic cloud load balancing algorithm DCLB (Dynamic Cloud Load Balancing) is used to balance the overhead towards the server. The core premise is to monitor traffic using the fuzzy logic approach, which employs different traffic parameters in conjunction with various built in measured to recognize the DDoS attack traffic in the network. Finally, the proposed method shows a 93% of average detection rate when compared to the existing model. This method is a unique attempt to comprehend the importance of DDoS mitigation techniques as well as good resource management during an attack and analysis of the.

Keywords: DDoS attack; resource scaling; DCLB; fuzzy logic; traffic parameters

Amrutha Muralidharan Nair and R Santhosh, “Mitigation of DDoS Attack in Cloud Computing Domain by Integrating the DCLB Algorithm with Fuzzy Logic” International Journal of Advanced Computer Science and Applications(IJACSA), 13(10), 2022. http://dx.doi.org/10.14569/IJACSA.2022.0131059

@article{Nair2022,
title = {Mitigation of DDoS Attack in Cloud Computing Domain by Integrating the DCLB Algorithm with Fuzzy Logic},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2022.0131059},
url = {http://dx.doi.org/10.14569/IJACSA.2022.0131059},
year = {2022},
publisher = {The Science and Information Organization},
volume = {13},
number = {10},
author = {Amrutha Muralidharan Nair and R Santhosh}
}



Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

IJACSA

Upcoming Conferences

IntelliSys 2025

28-29 August 2025

  • Amsterdam, The Netherlands

Future Technologies Conference 2025

6-7 November 2025

  • Munich, Germany

Healthcare Conference 2026

21-22 May 2026

  • Amsterdam, The Netherlands

Computing Conference 2026

9-10 July 2026

  • London, United Kingdom

IntelliSys 2026

3-4 September 2026

  • Amsterdam, The Netherlands

Computer Vision Conference 2026

15-16 October 2026

  • Berlin, Germany
The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org