4.6 Article

Enhancing Cloud Computing Analysis: A CCE-Based HTTP-GET Log Dataset

Related references

Note: Only part of the references are listed.
Article Engineering, Geological

Comparison between random forest and support vector machine algorithms for LULC classification

Cengiz Avci et al.

Summary: Nowadays, machine learning algorithms, especially Support Vector Machine (SVM) and Random Forest (RF), are widely used for classifying satellite images and mapping Earth's surface. This study focuses on analyzing the performance of these algorithms in land use and land cover (LULC) classification, particularly for wetlands that have important ecological functions. Sentinel-2 satellite image provided by European Space Agency (ESA) was utilized to monitor surface water and wetlands around Marmara Lake. The results showed that the RF algorithm achieved the most accurate classification, using 20 areas of interest (AOI).

INTERNATIONAL JOURNAL OF ENGINEERING AND GEOSCIENCES (2023)

Article Chemistry, Analytical

Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms

Juan A. Herrera-Silva et al.

Summary: This research uses dynamic analysis and machine learning to identify evolving ransomware signatures for detecting current and new variants of the threat.

SENSORS (2023)

Article Chemistry, Multidisciplinary

Detection of HTTP DDoS Attacks Using NFStream and TensorFlow

Martin Chovanec et al.

Summary: This paper presents the implementation of nfstream, an open source network data analysis tool and machine learning model based on TensorFlow, for detecting HTTP attacks. HTTP attacks are a common and significant security threat to networked systems. The proposed approach utilizes TensorFlow's machine learning capabilities to detect these attacks. The paper also discusses the collection and analysis of network traffic data using nfstream, which provides detailed analysis of network traffic flows. The collected data is pre-processed and transformed into vectors, which are then used to train the machine learning model using the TensorFlow library. The proposed model using nfstream and TensorFlow achieves high accuracy in detecting HTTP attacks, with minimal false positives.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset

Efstratios Chatzoglou et al.

Summary: This article discusses attacks against HTTP/2 and HTTP/3 protocols and evaluates four attacks on HTTP/3 using a testbed. One of the attacks was found to have a critical base score. Additionally, the authors created a large dataset containing traces of ten different attacks and conducted an initial evaluation using machine learning techniques.

COMPUTERS & SECURITY (2023)

Article Chemistry, Multidisciplinary

Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions

Umara Urooj et al.

Summary: This study investigates the significance of dynamic analysis for ransomware detection and provides an overview of the research progress in this field. It also discusses the data sources and the utilization of machine learning and deep learning techniques in ransomware detection. The study offers guidance for future research directions.

APPLIED SCIENCES-BASEL (2022)

Article Automation & Control Systems

FACVSPO: Fractional anti corona virus student psychology optimization enabled deep residual network and hybrid correlative feature selection for distributed denial-of-service attack detection in cloud using spark architecture

Muthuperumal Periyaperumal Ramkumar et al.

Summary: This paper presents a new model for DDoS attack detection using cloud computing, which combines multiple optimization algorithms and deep residual networks. The experiments show that the model outperforms existing methods in terms of testing accuracy and true positive rate.

INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING (2022)

Review Chemistry, Analytical

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

Taief Alaa Al-Amiedy et al.

Summary: This paper systematically reviews and analyzes the research landscape on machine learning, deep learning, and combined approaches applied to detect attacks in RPL networks. In addition, it examines existing datasets designed explicitly for RPL networks. Finally, it highlights the issues and challenges in existing studies and proposes future research directions.

SENSORS (2022)

Review Chemistry, Multidisciplinary

Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy

Ziyad R. Alashhab et al.

Summary: This survey discusses the security issues and challenges in cloud computing, proposes a new taxonomy for classifying cloud computing attacks and DDoS attacks, and compares it with existing surveys. The survey aims to serve as a guide and reference for researchers working on new DDoS attack detection approaches within the cloud computing environment.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks

A. Dhanapal et al.

Summary: The complexity of cloud infrastructure and the unique characteristics of cloud computing make detecting DDoS attacks challenging. This study proposes a cloud testbed framework implemented in the OpenStack environment for evaluating solutions against HTTP flooding DDoS attacks, using real-time data from the FIFA World Cup 1998.

WIRELESS NETWORKS (2021)

Article Computer Science, Artificial Intelligence

Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks

S. Velliangiri et al.

Summary: This study focuses on detecting DDoS attacks in cloud computing using deep learning, introducing the TEHO-DBN classifier and achieving improved performance with a maximum accuracy of 0.830 from simulation results.

JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE (2021)

Article Computer Science, Hardware & Architecture

Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed

Max Landauer et al.

Summary: This article proposes generating testbeds for IDS evaluation using strategies from model-driven engineering, which improves the configurability and flexibility of the testbeds and allows for the reuse of components across multiple scenarios.

IEEE TRANSACTIONS ON RELIABILITY (2021)

Article Computer Science, Artificial Intelligence

Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine

Gopal Singh Kushwah et al.

Summary: The study proposed a hybrid machine learning technique for detecting DDoS attacks by combining the ELM model with the blackhole optimization algorithm. Experiments demonstrated that the technique achieved high accuracy rates on four benchmark datasets, outperforming other techniques.

TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES (2021)

Article Computer Science, Information Systems

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

Abdullah Ahmed Bahashwan et al.

Summary: The research proposes a flow-based approach to detect abnormal NDP traffic behavior for identifying RA and NS DoS flooding attacks. Experimental results show that the proposed approach performs well in terms of detection accuracy, precision, recall, and F1-Score, and outperforms other existing methods significantly.

IEEE ACCESS (2021)

Article Computer Science, Artificial Intelligence

Detection of HTTP flooding attacks in cloud using fuzzy bat clustering

T. Raja Sree et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Information Systems

Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

R. Doriguzzi-Corin et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques

Abdul Raoof Wani et al.

PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI) (2019)

Article Computer Science, Software Engineering

THE SLOW HTTP DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION IN CLOUD

A. Dhanapal et al.

SCALABLE COMPUTING-PRACTICE AND EXPERIENCE (2019)

Article Computer Science, Information Systems

Intrusion detection of distributed denial of service attack in cloud

S. Velliangiri et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Software Engineering

THE SLOW HTTP DDOS ATTACKS: DETECTION, MITIGATION AND PREVENTION IN THE CLOUD ENVIRONMENT

A. Dhanapal et al.

SCALABLE COMPUTING-PRACTICE AND EXPERIENCE (2019)

Article Computer Science, Information Systems

A novel approach to defend multimedia flash crowd in cloud environment

Kriti Bhushan et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

A systematic survey on multi-step attack detection

Julio Navarro et al.

COMPUTERS & SECURITY (2018)

Article Engineering, Multidisciplinary

A New Generalized Deep Learning Framework Combining Sparse Autoencoder and Taguchi Method for Novel Data Classification and Processing

Ahmad M. Karim et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2018)

Article Multidisciplinary Sciences

Detection of HTTP Flooding Attacks in Cloud Using Dynamic Entropy Method

T. Raja Sree et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)

Article Computer Science, Interdisciplinary Applications

An anomaly-based approach for DDoS attack detection in cloud environment

Adnan Rawashdeh et al.

INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY (2018)

Proceedings Paper Computer Science, Information Systems

Analyzing Social Media through Big Data using InfoSphere BigInsights and Apache Flume

Marouane Birjali et al.

8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS (2017)

Proceedings Paper Computer Science, Theory & Methods

Proposed DAD-match Security Technique based on Hash Function to Secure Duplicate Address Detection in IPv6 Link-local Network

Ahmed K. Al-Ani et al.

PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Detecting Denial of Service Attacks in the Cloud

Raneel Kumar et al.

2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC (2016)

Article Computer Science, Artificial Intelligence

A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment

Junho Choi et al.

SOFT COMPUTING (2014)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Hardware & Architecture

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks

Ashley Chonka et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Information Systems

An Overview of IP Flow-Based Intrusion Detection

Anna Sperotto et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)

Article Computer Science, Hardware & Architecture

A workload characterization study of the 1998 World Cup Web site

M Arlitt et al.

IEEE NETWORK (2000)