Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model

M Bakro, RR Kumar, M Husain, Z Ashraf, A Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …

An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier

M Bakro, RR Kumar, A Alabrah, Z Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
The focus of cloud computing nowadays has been resha** the digital epoch, in which
clients now face serious concerns about the security and privacy of their data hosted in the …

Efficient intrusion detection system in the cloud using fusion feature selection approaches and an ensemble classifier

M Bakro, RR Kumar, AA Alabrah, Z Ashraf, SK Bisoy… - Electronics, 2023 - mdpi.com
The application of cloud computing has increased tremendously in both public and private
organizations. However, attacks on cloud computing pose a serious threat to confidentiality …

A deep learning approach for intrusion detection systems in cloud computing environments

WH Aljuaid, SS Alshamrani - Applied Sciences, 2024 - mdpi.com
Cloud computing services have become indispensable to people's lives. Many of their
activities are performed through cloud services, from small companies to large enterprises …

[HTML][HTML] Deep Learning-Driven Defense Strategies for Mitigating DDoS Attacks in Cloud Computing Environments

DMAA Afraji, J Lloret, L Peñalver - Cyber Security and Applications, 2025 - Elsevier
The kind of cyber threat prevalent and most dangerous to networked systems is the
Distributed Denial of Service (DDoS), especially with expanded connection of Internet of …

Cloud computing platform: Performance analysis of prominent cryptographic algorithms

A Ajmal, S Ibrar, R Amin - Concurrency and Computation …, 2022 - Wiley Online Library
With advancements in science and technology, cloud computing is the next big thing in the
industry. Cloud cryptography is a technique that uses encryption algorithms to secure data …

Detecting Unbalanced Network Traffic Intrusions with Deep Learning

S Pavithra, KV Vikas - IEEE Access, 2024 - ieeexplore.ieee.org
The growth of cyber threats demands a robust and adaptive intrusion detection system (IDS)
capable of effectively recognizing malicious activities from network traffic. However, the …

Develo** a cloud intrusion detection system with filter-based features selection techniques and SVM classifier

M Bakro, RR Kumar, SK Bisoy, MO Addas… - International Conference …, 2022 - Springer
The rising usage of the cloud nowadays and its usage in various domains have made it
more essential for all, which has led to an expansion in the size of data kept in the cloud …

A CNN-RF Hybrid Model for Intrusion Detection System: Analysis, Improvements, and Application

A Elmasry, W Abdullah - Artificial Intelligence in Cybersecurity, 2024 - sciencesforce.com
With the rapid development of technologies and the growing need for the internet in most
aspects of life, the need for cyber security is also growing. There are various types of cyber …

Designing a System Using Features Selection Based on Filter Methods and XGBoost Classifier for Detecting Intrusion in Cloud

M Bakro, RR Kumar, SK Bisoy, MO Addas… - … Conference on Advanced …, 2022 - Springer
Recently, with the accelerating growth of using cloud computing and its related services in
various aspects, the difficulty of ensuring cybersecurity is always increasing. Thus, it was …