
www.rsisinternational.org
INTERNATIONAL JOURNAL OF RESEARCH AND INNOVATION IN SOCIAL SCIENCE (IJRISS)
ISSN No. 2454-6186 | DOI: 10.47772/IJRISS | Volume IX Issue X October 2025
performance. The 40% loss rate in HTTP Flood confirms that conventional volume-based defense systems are
insufficient. While CloudSim provides a controlled, reproducible environment for systematic DDoS analysis, we
acknowledge that simulation results require validation against real-world datasets to confirm external validity.
Future work will compare these findings with empirical data from production cloud environments and evaluate
the implemented countermeasures under realistic traffic patterns.
CONCLUSION
This study demonstrated, via CloudSim simulation, that both SYN Flood and HTTP Flood attacks severely
compromise cloud infrastructure integrity, but HTTP Flood is more destructive due to its application-layer
complexity and high resource consumption. Cloud defenses must therefore move beyond volumetric detection
to intelligent, behavior-based mechanisms capable of identifying application-level anomalies. Future work will
integrate machine-learning-based detection and mitigation modules into the same CloudSim testbed for
comparative evaluation.
REFERENCES
1. N. Agrawal and S. Tapaswi, Defense mechanisms against DDOS attacks in a cloud computing
environment: State-of-the-Art and Research challenges, IEEE Communications Surveys & Tutorials
21(4) (2019) 3769–3795.
2. M. Darwish, A. Ouda, and L. F. Capretz, Cloud-based DDoS attacks and defenses, Journal of Network
and Computer Applications 176 (2021) 102914.
3. R. V. Deshmukh and K. K. Devadkar, Understanding DDoS Attack & its Effect in Cloud
Environment, Procedia Computer Science 49 (2015) 202–210.
4. S. Madan, A. Anita, and A. Ali, DDoS attacks in cloud environment, International Journal of Health
Sciences 6(S4) (2022) 5836–5847.
5. A. Sharma, R. Islam, and D. Ningombam, Analysis of DDoS attack in cloud infrastructure, in: Soft
Computing Techniques and Applications, Springer, 2021, pp. 245–253.
6. M. Saran, R. K. Yadav, and U. N. Tripathi, Mitigation of DDoS attacks in cloud computing using a
Bayesian hyperparameter optimization-based machine learning approach, International Journal for
Research Trends and Innovation 7(11) (2022) 765–771.
7. M. Cohen Gadol, DDOS and Cloud Auto-Scaling Mechanism, M.Sc. thesis, The
8. Interdisciplinary Center, Herzliya, 2016.
9. H. Ouarnoughi, J. Boukhobza, F. Singhoff, and S. Rubini, Integrating I/Os in CloudSIM for
performance and energy estimation, in: Proceedings of WOPSSS '16, 2016, pp. 40–47.
10. S. Karthik and J. J. Shah, Analysis of simulation of DDoS attack in cloud, in: Proceedings of ICICES
2014, IEEE, 2014, pp. 1–5.
11. A. A. A. Ali, et al., Efficient DDoS Attack Detection and Prevention Framework Using CloudSim,
International Journal of Computer Science and Mobile Computing 7(8) (2018) 234–241.
12. K. O. Basulaim and H. M. Al-Amoudi, Reinforcement Learning for Detection and Prevention of
DDoS Attacks in Cloud Environment, International Journal of Computer Systems Science 17(1)
(2023) 45–62.
13. I. Sreeram and V. P. K. Vuppala, HTTP flood attack detection in application layer using machine
learning metrics and bio-inspired Bat algorithm, Applied Computing and Informatics 16(1/2) (2018)
183–201.
14. RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms, IETF Datatracker,
https://datatracker.ietf.org/doc/rfc5166