<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="13530" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/13530?output=omeka-xml" accessDate="2026-05-04T17:38:02+00:00">
  <collection collectionId="5">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="64">
                <text>Articles</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="19">
    <name>Article</name>
    <description>Faculty Publications -Articles</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86333">
              <text>A Deep Ensemble Framework for DDoS Attack Recognition and Mitigation in Cloud SDN Environment</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86334">
              <text>Deep Learning Based Ensemble Model (DLEM); Distributed Denial of Service (DDoS); Machine Learning (ML); Software Defined Network (SDN); Virtual Machine (VM)</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86335">
              <text>Much research has been done in the recent past on the absolute shift of Internet infrastructure in order to make it more significantly programmable, configurable and make it more conveniently feasible. Software Defined Networking (SDN) forms the basis for this absolute shift in Internet infrastructure. When you look at the benefits of an SDN-based cloud environment they are monumental. Namely, network traffic control and elastic resource management. The SDN-based cloud environment becomes susceptible to cyber threats, especially like that of Distributed Denial of Service (DDoS) attacks and other cyber-attacks that perturb the SDN-based cloud environment. Hence, automated Machine Learning (ML) models are an efficient way to protect against these cyber-attacks. This research will develop a deep learning-based ensemble model for DDoS attack detection and classification (DLEM-DDoS) in a cloud environment. Long Short-Term Memory (LSTM), 1-D Convolutional Neural Networks (1D-CNN) and Gated Recurrent Unit (GRU) are the three DL models integrated into an ensemble model that classifies the incoming packet by majority voting classifiers. Network traffic data including source and destination IP addresses, packet and byte counts, packet and byte rates, flow duration, protocol types and port numbers are fed into the DLEM-DDoS model. This model preprocesses this data by converting categorical values (like protocol types) into numerical values and removing any missing values. Once collected and preprocessed, the data is fed into deep learning models (LSTM, 1D-CNN, GRU) within the framework for analysis. Finally, in this research using the DLEM-DDoS technique an efficient DDoS attack mitigation scheme in an SDN-based cloud environment is demonstrated. The report shows comprehensive stimulations as well as a superiority into the current approaches in terms of several measures.  2024 S. Annie Christila and R. Sivakumar. This open-access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86336">
              <text>Christila S.A.; Sivakumar R.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="86337">
              <text>Journal of Computer Science, Vol-20, No. 10, pp. 1281-1290.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="86338">
              <text>Science Publications</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86339">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="86340">
              <text>&lt;a href="https://doi.org/10.3844/jcssp.2024.1281.1290" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.3844/jcssp.2024.1281.1290&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85202921073&amp;amp;doi=10.3844%2Fjcssp.2024.1281.1290&amp;amp;partnerID=40&amp;amp;md5=9cc3283b09825aef337a8de1b7d1352b" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85202921073&amp;amp;doi=10.3844%2fjcssp.2024.1281.1290&amp;amp;partnerID=40&amp;amp;md5=9cc3283b09825aef337a8de1b7d1352b&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86341">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="86342">
              <text>ISSN: 15493636</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86343">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86344">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="86345">
              <text>Article</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="86346">
              <text>Christila S.A., Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, India, Department of Computer Science, St. Francis de Sales College, Bengaluru, India; Sivakumar R., Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
