Machine learning for cloud security: a systematic review

AB Nassif, MA Talib, Q Nasir, H Albadani… - IEEE …, 2021 - ieeexplore.ieee.org
The popularity and usage of Cloud computing is increasing rapidly. Several companies are
investing in this field either for their own use or to provide it as a service for others. One of …

[HTML][HTML] A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks

JF Balarezo, S Wang, KG Chavez, A Al-Hourani… - … Science and Technology …, 2022 - Elsevier
Abstract Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks have been
one of the biggest threats against communication networks and applications throughout the …

Embedding blockchain technology into IoT for security: A survey

L Da Xu, Y Lu, L Li - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In recent years, the Internet of Things (IoT) has made great progress. The interconnection
between IoT and the Internet enables real-time information processing and transaction …

Distributed denial of service attacks and its defenses in IoT: a survey

MM Salim, S Rathore, JH Park - The Journal of Supercomputing, 2020 - Springer
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …

A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment

H Aydın, Z Orman, MA Aydın - Computers & Security, 2022 - Elsevier
The fact that cloud systems are under the increasing risks of cyber attacks has made the
phenomenon of information security first a need and then a necessity for these systems …

Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection

D Alghazzawi, O Bamasag, H Ullah, MZ Asghar - Applied Sciences, 2021 - mdpi.com
DDoS (Distributed Denial of Service) attacks have now become a serious risk to the integrity
and confidentiality of computer networks and systems, which are essential assets in today's …

An intrusion detection system against DDoS attacks in IoT networks

M Roopak, GY Tian, J Chambers - 2020 10th annual …, 2020 - ieeexplore.ieee.org
In this paper, we present an Intrusion Detection System (IDS) using the hybridization of the
deep learning technique and the multi-objective optimization method for the detection of …

Deep generative learning models for cloud intrusion detection systems

L Vu, QU Nguyen, DN Nguyen… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Intrusion detection (ID) on the cloud environment has received paramount interest over the
last few years. Among the latest approaches, machine learning-based ID methods allow us …

Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks

S Velliangiri, P Karthikeyan… - Journal of Experimental & …, 2021 - Taylor & Francis
Cloud computing services provide a wide range of resource pool for maintaining a large
amount of data. Cloud services are commonly used as the private or public data forum …

Voting extreme learning machine based distributed denial of service attack detection in cloud computing

GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …