Machine learning for cloud security: a systematic review
The popularity and usage of Cloud computing is increasing rapidly. Several companies are
investing in this field either for their own use or to provide it as a service for others. One of …
investing in this field either for their own use or to provide it as a service for others. One of …
[HTML][HTML] A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks
Abstract Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks have been
one of the biggest threats against communication networks and applications throughout the …
one of the biggest threats against communication networks and applications throughout the …
Embedding blockchain technology into IoT for security: A survey
In recent years, the Internet of Things (IoT) has made great progress. The interconnection
between IoT and the Internet enables real-time information processing and transaction …
between IoT and the Internet enables real-time information processing and transaction …
Distributed denial of service attacks and its defenses in IoT: a survey
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …
A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment
The fact that cloud systems are under the increasing risks of cyber attacks has made the
phenomenon of information security first a need and then a necessity for these systems …
phenomenon of information security first a need and then a necessity for these systems …
Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection
DDoS (Distributed Denial of Service) attacks have now become a serious risk to the integrity
and confidentiality of computer networks and systems, which are essential assets in today's …
and confidentiality of computer networks and systems, which are essential assets in today's …
An intrusion detection system against DDoS attacks in IoT networks
In this paper, we present an Intrusion Detection System (IDS) using the hybridization of the
deep learning technique and the multi-objective optimization method for the detection of …
deep learning technique and the multi-objective optimization method for the detection of …
Deep generative learning models for cloud intrusion detection systems
Intrusion detection (ID) on the cloud environment has received paramount interest over the
last few years. Among the latest approaches, machine learning-based ID methods allow us …
last few years. Among the latest approaches, machine learning-based ID methods allow us …
Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks
Cloud computing services provide a wide range of resource pool for maintaining a large
amount of data. Cloud services are commonly used as the private or public data forum …
amount of data. Cloud services are commonly used as the private or public data forum …
Voting extreme learning machine based distributed denial of service attack detection in cloud computing
GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …
This attack makes the cloud services inaccessible to the end-users by exhausting resources …