4.7 Article

DDoS attack prediction using a honey badger optimization algorithm based feature selection and Bi-LSTM in cloud environment

Related references

Note: Only part of the references are listed.
Article Computer Science, Interdisciplinary Applications

Honey Badger Algorithm: New metaheuristic algorithm for solving optimization problems

Fatma A. Hashim et al.

Summary: This paper introduces a new metaheuristic optimization algorithm called Honey Badger Algorithm (HBA), inspired by the intelligent foraging behavior of honey badgers, to develop an efficient search strategy for solving optimization problems. Experimental results demonstrate the effectiveness and superiority of HBA in solving optimization problems with complex search-space.

MATHEMATICS AND COMPUTERS IN SIMULATION (2022)

Article Telecommunications

Unital Design Based Location Service for Subterranean Network Using Long Range Topology

S. J. Syed Ali Fathima et al.

Summary: Wireless underground networks are able to monitor physical parameters underground continuously, overcoming challenges of limited coverage, high deployment costs, complex network topology, and difficult node placement. This research proposes a localization model using a metaheuristic optimization algorithm, achieving high accuracy.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Hardware & Architecture

An integrated approach explaining the detection of distributed denial of service attacks

Raj Kumar Batchu et al.

Summary: In this paper, a novel efficient model is developed to detect DDOS attacks by addressing the issues of irrelevant features, lack of transparency, and class imbalance. The model improves the detection efficiency by performing data preprocessing, oversampling, feature selection, and dynamic ensemble selection. The results show that the model outperforms existing approaches and achieves high accuracy in the balanced data scenario.

COMPUTER NETWORKS (2022)

Article Computer Science, Information Systems

Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing

S. Krishnaveni et al.

Summary: Cloud computing is a preferred option for organizations worldwide, offering scalable and internet-based resources. However, security and privacy are significant obstacles to its success. The increase in network traffic has led to more complex and widespread security breaches, making traditional intrusion detection systems inefficient. A proposed efficient Intrusion Detection System (IDS) for the cloud environment achieved significant performance enhancement compared to existing methods.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

Large group activity security risk assessment and risk early warning based on random forest algorithm

Yanyu Chen et al.

Summary: This paper evaluates and warns security risks of large-scale group activities based on the random forest algorithm, achieving a maximum classification accuracy rate of 0.86 through model optimization and training experiments, demonstrating the algorithm's strong predictive ability in risk assessment.

PATTERN RECOGNITION LETTERS (2021)

Article Computer Science, Artificial Intelligence

A cognitive mechanism for mitigating DDoS attacks using the artificial immune system in a cloud environment

Damai Jessica Prathyusha et al.

Summary: This paper proposes the use of artificial immune systems to alleviate DDoS attacks in cloud computing, by identifying the most potential features of the attack, with high detection accuracy and low false alarm rate.

EVOLUTIONARY INTELLIGENCE (2021)

Article Computer Science, Artificial Intelligence

Bird swarm algorithms with chaotic mapping

Elif Varol Altay et al.

ARTIFICIAL INTELLIGENCE REVIEW (2020)

Review Computer Science, Artificial Intelligence

Moth-flame optimization algorithm: variants and applications

Mohammad Shehab et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Information Systems

FCM-SVM based intrusion detection system for cloud computing environment

Aws Naser Jaber et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Hybrid many-objective particle swarm optimization algorithm for green coal production problem

Zhihua Cui et al.

INFORMATION SCIENCES (2020)

Review Computer Science, Artificial Intelligence

Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments

Nadim Rana et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Information Systems

Detection of distributed denial of service attacks based on information theoretic approach in time series models

Jisa David et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Review Computer Science, Information Systems

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

Shahab Shamshirband et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

On the performance improvement of elephant herding optimization algorithm

Mostafa A. Elhosseini et al.

KNOWLEDGE-BASED SYSTEMS (2019)

Article Computer Science, Information Systems

Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud

Trung Phan et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Intrusion detection of distributed denial of service attack in cloud

S. Velliangiri et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm

Bahram Hajimirzaei et al.

ICT EXPRESS (2019)