Abstract
TCP-based Distributed Denial of Service (DDoS) attacks pose a significant danger to cloud infrastructures because they can imitate genuine traffic patterns, making them difficult to detect using standard approaches. This study introduces the Self-Attention and Intersample Attention Transformer (SAINT) model, a unique deep learning architecture that incorporates Sparse Logistic Regression to address these issues. The SAINT framework uses dual attention mechanisms-self-attention for capturing complicated intraflow dependencies and intersample attention for assessing interflow relationships-to provide enhanced detection of malicious traffic. SAINT, unlike existing methodologies, prioritizes scalability, interpretability, and computational efficiency, distinguishing it from traditional models such as CNNs, RNNs, and ensemble techniques. The model’s efficacy was evaluated using the BCCC-cPacket-Cloud-DDoS-2024 dataset, which included 700,000 traffic flows across 17 advanced attack scenarios, with state-of-the-art metrics: 95% precision, 95% recall, 96% F1 score, and 97% accuracy. Furthermore, studies on the CICDDoS2019 dataset confirmed SAINT’s resilience and flexibility to a variety of network conditions. SAINT addresses real-world issues in cloud-based DDoS detection, such as temporal and spatial traffic complexities, to provide a viable, high performance solution for protecting current cloud infrastructures. This work establishes the groundwork for scalable, adaptable, and efficient cloud-native security frameworks, paving the path for enhanced countermeasures to changing cyber threats.



















Similar content being viewed by others
Data availibility
No datasets were generated or analyzed during the current study.
References
Ritrovato P, Xhafa F, Giordano A (2018) Edge and cluster computing as enabling infrastructure for internet of medical things, In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), IEEE, pp 717–723
Kirubavathi G, Anne WR, Sridevi UK (2024) A recent review of ransomware attacks on healthcare industries, Int J Syst Assur Eng Manage, 1–9
Kirubavathi G, Anne WR (2024) Behavioral based detection of android ransomware using machine learning techniques, Int J Syst Assur Eng Manage, 15(9)
Amato F, Moscato F, Xhafa F, Vivenzio E (2019) Smart intrusion detection with expert systems. In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing: Proceedings of the 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2018), Springer, pp 148–159
Chen J, Zhang Y (2020) Advanced Detection Techniques for TCP-bypassV1 Attacks. J Netw Comput Appl 155:102409
Li Y, He J, Zhang X (2017) Cross-protocol exploits: understanding and mitigating TCP-IGMP attacks. ACM SIGCOMM Comput Commun Rev 47(2):25–36
Johnson D, Patel K (2018) Advanced detection methods for TCP-CONTROL attacks. IEEE Trans Netw Serv Manage 15(4):1202–1213
Kim S, Lee H (2020) Mitigation strategies for TCP-Flag-SYN attacks. IEEE Trans Inf Forensics Secur 15(5):1273–1284
Gao X, Li Y (2017) Detecting TCP-flag-SYNACK attacks: a machine learning approach. IEEE Trans Netw Serv Manage 14(2):475–485
Park H, Kim H, Kim H (2019) Analysis of TCP flag-based DDoS attack and detection algorithm design. J Info Security Appl 46:123–134. https://doi.org/10.1016/j.jisa.2019.02.003
Singh A, Jain M (2020) Advanced detection techniques for TCP-flag-RSTACK attacks. J Netw Comput Appl 156:102433
Wang X, Liu Y (2017) Real-time detection of TCP-based DDoS attacks with time series analysis. Comput Security 70:186–199. https://doi.org/10.1016/j.cose.2017.05.005
Zhang X, Wang Y (2018) Detecting and mitigating TCP-Flag-SYNTFO attacks. J Netw Comput Appl 132:62–73
Huang J, Zhou X (2019) Advanced detection methods for TCP-flag-OSYN attacks. IEEE Trans Inf Forensics Secur 14(8):2212–2221
Li Y, He J (2018) Detecting and mitigating TCP-flag-OSYNP attacks. J Netw Comput Appl 123:54–66
Peng T, Leckie C, Ramamohanarao K (2016) Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv 39(1):3–6
Agrawal N, Tapaswi S (2019) Defense mechanisms against DDoS attacks in a cloud computing environment: state-of-the-art and research challenges. IEEE Commun Surv Tutor 21(4):3769–3795
Phan TV, Park M (2019) Efficient distributed denial-of-service attack defense in SDN-based cloud. IEEE Access 7:18701–18714
Al-Mimi H, Hamad NA, Abualhaj MM, Daoud MS, Al-Dahoud A, Rasmi M (2023) An enhanced intrusion detection system for protecting HTTP services from attacks. Int J Adv Soft Comput Appl, 15(3)
Al-Mimi H, Hamad NA, Abualhaj MM (2023) A model for the disclosure of probe attacks based on the utilization of machine learning algorithms. In: 2023 10th International Conference on Electrical and Electronics Engineering (ICEEE), pp 241–247, IEEE
Abualhaj M, Al-Zyoud M, Hiari M, Alrabanah Y, Anbar M, Amer A, Al-Allawee A (2024) A fine-tuning of decision tree classifier for ransomware detection based on memory data. Int J Data Netw Sci 8(2):733–742
Abualhaj MM, Al-Khatib SN (2024) Using decision tree classifier to detect Trojan Horse based on memory data. TELKOMNIKA (Telecommun Comput Electron Control) 22(2):393–400
Al-Amiedy TA, Anbar M, Belaton B, Bahashwan AA, Abualhaj MM (2024) Towards a lightweight detection system leveraging ranking techniques with wrapper feature selection algorithm for selective forwarding attacks in low power and lossy networks of IoTs. In: 2024 4th International Conference on Emerging Smart Technologies and Applications (eSmarTA), pp 1–17, IEEE
Maz YA, Anbar M, Manickam S, Abualhaj MM (2024) Transfer learning approach for detecting keylogging attack on the internet of things. In: 2024 4th International Conference on Emerging Smart Technologies and Applications (eSmarTA), pp 1–8, IEEE
Abualhaj MM, Al-Shamayleh AS, Munther A, Alkhatib SN, Hiari MO, Anbar M (2024) Enhancing spyware detection by utilizing decision trees with hyperparameter optimization. Bull Electr Eng Inform 13(5):3653–3662
Abualhaj MM, Al-Khatib SN, Al-Allawee A, Munther A, Anbar M (2024) Enhancing network intrusion detection systems through dimensionality reduction. In: International Conference on Soft Computing and Data Mining, pp 244–253, Springer Nature Switzerland, Cham
Munther A, Abualhaj MM, Alalousi A, Fadhil HA (2024) A significant features vector for internet traffic classification based on multi-features selection techniques and ranker, voting filters. Int J Electr Comput Eng (2088-8708), 14(6)
Yanamala AKY (2024) Emerging challenges in cloud computing security: a comprehensive review. Int J Adv Eng Technol Innov 1(4):448–479
Pei J, Chen Y, Ji W (2019) A DDoS attack detection method based on machine learning. In: International Journal of Computer Applications
Saini PS, Behal S, Bhatia S (2020) Detection of DDoS attacks using machine learning algorithms. In: International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), IEEE, pp 1–8
Kirubavathi G, Amithesh Y (2024) Detection and characterization of darknet traffic using attention LSTM with XAI. In: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)
Kirubavathi G, Nithish S (2024) Dynamic ensemble learning framework enhanced with XAI to detect Android malware. In: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)
Kirubavathi G, Aarsha Nair KS (2024) Stacking framework for detecting braktooth attack on iot health care systems. In: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)
Kirubavathi G, AR N (2024) Hybrid deep learning framework-based intrusion detection system for the internet of things. In: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)
Ganapathiyappan K, Yadav A (2025) Optimized deep learning technique for the effective detection of windows PE malware. In: Joshi S, Bairwa AK, Radenkovic M, Pljonkin A (eds) Cyber Warfare, Security and Space Computing, Communications in Computer and Information Science, vol 2195. Springer, Cham
Ganapathiyappan K, Noorudheen F (2025) A deep learning approach to PDF malware detection enhanced with XAI. In: Joshi S, Bairwa AK, Radenkovic M, Pljonkin A (eds) Cyber Warfare, Security and Space Computing, Communications in Computer and Information Science, vol 2195. Springer, Cham. https://doi.org/10.1007/978-3-031-73494-6_26
Wani AR, Rana QP, Saxena U, Pandey N (2019) Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. In: International Journal of Information Technology
Guo H, Li X, Zhang Y (2023) Attention mechanism and sparse logistic regression for malicious web traffic detection. IEEE Trans Netw Serv Manage 20(1):150–161
Zhang T, Wu J, Liu F (2024) Attention-based sparse regression for low-rate DDoS detection in IoT networks. J Netw Comput Appl 127:45–56
Lin Q, Huang Z, Chen K (2022) An attention-enhanced sparse logistic regression framework for cloud anomaly detection. Clust Comput 25(4):1201–1215
Söğüt E, Erdem OA (2023) A multi-model proposal for classification and detection of DDoS attacks on SCADA systems. Appl Sci 13:5993. https://doi.org/10.3390/app13105993
Najar AA (2025) Manohar Naik S AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing. Clust Comput 28(2):103
JSAN | Free Full-Text | DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges. (2023). MDPI
Kartheek R, Yadav MR, Raju BSK, Indumathy K (2023) Recognizing DDoS attacks and their impact in cloud environments. IJFMR, 5(6)
Xu Z, Zhang H, Wang Y, Chang X, Liang Y (2010) \(L_{\frac{1}{2}}\) regularization. Sci China Inf Sci 53:1159–1169
Xu Z, Chang X, Xu F, Zhang H (2012) \(L_{\frac{1}{2}}\) regularization: a thresholding representation theory and a fast solver. IEEE Trans Neural Netw Learn Syst 23(7):1013–1027
Liang Y, Liu C, Luan XZ, Leung KS, Chan TM, Xu ZB, Zhang H (2013) Sparse logistic regression with a \(L_{\frac{1}{2}}\) penalty for gene selection in cancer classification. BMC Bioinform 14:1–12
Chen DW, Miao R, Deng ZY, Lu YY, Liang Y, Huang L (2020) Sparse logistic regression with \(L_{\frac{1}{2}}\) penalty for emotion recognition in electroencephalography classification. Front Neuroinform 14:29
Yu D, Kang Q, Jin J, Wang Z, Li X (2023) Smoothing group \(L_{\frac{1}{2}}\) regularized discriminative broad learning system for classification and regression. Pattern Recogn 141:109656
Chao M, Lu Y, Jian J, Xu X (2024) An efficient regularized PR splitting type algorithm for two-block nonconvex linear constrained programs in \(L\mathcalligra{l}_{\frac{1}{2}}\) regularized compressed sensing problems. J Comput Appl Math, 116145
MohammadMoein Shafi, Lashkari AH, Rodriguez V, Nevo R (2024) Toward generating a new cloud-based distributed denial of service (DDoS) dataset and cloud intrusion traffic characterization. Information 15(4):195. https://doi.org/10.3390/info15040195
Kaur B, Dadkhah S, Shoeleh F, Neto ECP, Xiong P, Iqbal S, Lamontagne P, Ray S, Ghorbani AA (2023) Internet of things (IoT) security dataset evolution: challenges and future directions. Internet of Things 22:100780
Mohanta BK, Jena D, Satapathy U, Patnaik S (2020) Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things 11:100227
G K, Y A (2024) Detection and characterization of darknet traffic using attention LSTM with XAI. In: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), pp 1–7. IEEE. https://doi.org/10.1109/ISCS61804.2024.10581210
Rejeb A, Rejeb K, Treiblmaier H, Appolloni A, Alghamdi S, Alhasawi Y, Iranmanesh M (2023) The Internet of Things (IoT) in healthcare: taking stock and moving forward. Internet of Things 22:100721
G K, Nair AR (2024) Hybrid deep learning framework-based intrusion detection system for the internet of things. In: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), pp 1–6. IEEE. https://doi.org/10.1109/ISCS61804.2024.10581228
Balakrishnan N, Rajendran A, Pelusi D, Ponnusamy V (2021) Deep belief network enhanced intrusion detection system to prevent security breach in the internet of things. Internet of Things 14:100112
G K, S A N K (2024) Stacking framework for detecting braktooth attack on IoT health care systems. In: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), pp 1–7. IEEE. https://doi.org/10.1109/ISCS61804.2024.10581018
Najar AA, Sugali MN, Lone FR, Nazir A A novel CNN-based approach for detection and classification of DDoS attacks, concurrency and computation: practice and experience, First published: 03 June 2024, https://doi.org/10.1002/cpe.8157
Ravinarayanan B, Nagesh HR (2022)A hybrid model for DDoS attack detection using LSTM-RNN. In: Smart Intelligent Computing and Applications, Volume 2: Proceedings of Fifth International Conference on Smart Computing and Informatics (SCI 2021), Springer, pp 281–294
Alashhab AA, Zahid MS, Isyaku B, Elnour AA, Nagmeldin W, Abdelmaboud A, Abdullah TAA, Maiwada U (2024) Enhancing DDoS attack detection and mitigation in SDN using an ensemble online machine learning model. IEEE Access, IEEE
Smith A, Johnson B, Williams C (2024) A new cloud-based distributed denial of service (DDoS) dataset for advanced detection systems. J Cloud Comput Adv Syst Appl 10(3):45–60
Kumar D, Zhao E, Li F (2024) Comprehensive intrusion traffic characterization in cloud environments: challenges and solutions. IEEE Trans Cloud Comput 12(1):75–90
Brown G, Garcia H, Miller I (2024) A hybrid approach to DDoS detection: combining signature-based and anomaly-based methods. ACM Trans Cyber-Phys Syst 8(2):123–140
Lee J, Park K, Kim L (2024) Deep learning models for enhanced cloud security: a case study on DDoS detection. IEEE Access 12:20045–20060
Wang M, Patel N, Clark O (2024) Real-time intrusion detection in cloud platforms: design and implementation. Int J Inf Secur 23(4):215–230
Robinson P, Chen Q, Taylor R (2024) Traffic analysis and behavioral pattern recognition in cloud-based environments. J Netw Comput Appl 52(1):30–45
Martinez S, Wang T, Singh U (2024) Scalable DDoS mitigation strategies in multi-cloud architectures. Comput Secur 101:135–150
Acknowledgements
This is our original research work.
Author information
Authors and Affiliations
Contributions
GK contributed overall domain contributions, SIR contributed Mathematical part, JM and Durgesh thoroughly proof read the manuscript.
Corresponding author
Ethics declarations
Conflict of interests
The authors declare no Conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kirubavathi, G., Sumathi, I.R., Mahalakshmi, J. et al. Detection and mitigation of TCP-based DDoS attacks in cloud environments using a self-attention and intersample attention transformer model. J Supercomput 81, 474 (2025). https://doi.org/10.1007/s11227-025-06940-5
Accepted:
Published:
DOI: https://doi.org/10.1007/s11227-025-06940-5