4.4 Article

Detecting DDoS Attacks in Cloud Computing Using Extreme Learning Machine and Adaptive Differential Evolution

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment

M. Mayuranathan et al.

Summary: An efficient feature subset selection based classification model is introduced for the identification of DDoS attack, utilizing Random Harmony Search (RHS) optimization model for feature selection and a Deep learning based classifier model for detection, resulting in improved detection accuracy.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Artificial Intelligence

Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks

S. Velliangiri et al.

Summary: This study focuses on detecting DDoS attacks in cloud computing using deep learning, introducing the TEHO-DBN classifier and achieving improved performance with a maximum accuracy of 0.830 from simulation results.

JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE (2021)

Proceedings Paper Computer Science, Information Systems

Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment

Akshat Gaurav et al.

Summary: Cloud computing is a utility sharing platform where users can rent services to improve performance but can also be targeted by various cyberattacks. This paper presents a statistical approach for detecting DDoS attacks on cloud computing platforms, achieving an accuracy of 96%.

2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) (2021)

Article Telecommunications

Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform

Neha Agrawal et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Artificial Intelligence

A competitive swarm optimizer with hybrid encoding for simultaneously optimizing the weights and structure of Extreme Learning Machines for classification problems

Mohammed Eshtay et al.

INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2020)

Article Computer Science, Information Systems

Distributed denial of service attacks detection in cloud computing using extreme learning machine

Gopal Singh Kushwah et al.

INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS (2019)

Article Computer Science, Artificial Intelligence

Improving Extreme Learning Machine by Competitive Swarm Optimization and its application for medical diagnosis problems

Mohammed Eshtay et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Information Systems

Low rate cloud DDoS attack defense method based on power spectral density analysis

Neha Agrawal et al.

INFORMATION PROCESSING LETTERS (2018)

Article Computer Science, Information Systems

Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest

Mohamed Idhammad et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Engineering, Electrical & Electronic

An Effective DOS Attack Detection Model in Cloud Using Artificial Bee Colony Optimization

Jitendra Kumar Seth et al.

3D RESEARCH (2018)

Article Multidisciplinary Sciences

Distributed Denial-of-Service Attack Detection and Mitigation Using Feature Selection and Intensive Care Request Processing Unit

Nitesh Bharot et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)

Article Computer Science, Information Systems

CFaaS: bilaterally agreed evidence collection

Ahmed Nour Moussa et al.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

A protocol-free detection against cloud oriented reflection DoS attacks

Le Xiao et al.

SOFT COMPUTING (2017)

Article Telecommunications

Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach

Abdulaziz Aborujilah et al.

JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS (2017)

Article Computer Science, Artificial Intelligence

An improved cuckoo search based extreme learning machine for medical data classification

P. Mohapatra et al.

SWARM AND EVOLUTIONARY COMPUTATION (2015)

Article Computer Science, Artificial Intelligence

Extreme learning machine: algorithm, theory and applications

Shifei Ding et al.

ARTIFICIAL INTELLIGENCE REVIEW (2015)

Article Computer Science, Artificial Intelligence

An improved evolutionary extreme learning machine based on particle swarm optimization

Fei Han et al.

NEUROCOMPUTING (2013)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Artificial Intelligence

Self-Adaptive Evolutionary Extreme Learning Machine

Jiuwen Cao et al.

NEURAL PROCESSING LETTERS (2012)

Article Engineering, Multidisciplinary

A comparative study of differential evolution and genetic algorithms for optimizing the design of water distribution systems

Xiao-lei Dong et al.

JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A (2012)

Article Computer Science, Interdisciplinary Applications

A study on synergy of multiple crossover operators in a hierarchical genetic algorithm applied to structural optimisation

Carlos Conceicao Antonio

STRUCTURAL AND MULTIDISCIPLINARY OPTIMIZATION (2009)

Article Computer Science, Artificial Intelligence

Evolutionary extreme learning machine

QY Zhu et al.

PATTERN RECOGNITION (2005)

Article Computer Science, Artificial Intelligence

Hybrid crossover operators for real-coded genetic algorithms:: an experimental study

F Herrera et al.

SOFT COMPUTING (2005)

Article Mathematics, Applied

On the Moore-Penrose generalized inverse matrix

MA Rakha

APPLIED MATHEMATICS AND COMPUTATION (2004)

Article Computer Science, Artificial Intelligence

An empirical study on the synergy of multiple crossover operators

HS Yoon et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2002)