4.6 Article

Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions

Zhiheng Zhong et al.

Summary: This article provides a comprehensive literature review of existing machine learning-based container orchestration approaches. It proposes detailed taxonomies and conducts a comparative analysis. These approaches can improve the quality of resource provisioning decisions, but there are many open research challenges and potential future directions.

ACM COMPUTING SURVEYS (2022)

Article Chemistry, Analytical

An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs

Gaoyuan Liu et al.

Summary: This paper proposes a WSN intelligent intrusion detection model based on edge computing, which combines the k-Nearest Neighbor algorithm and arithmetic optimization algorithm to detect intrusions in the WSN, achieving high accuracy and performance in experimental tests.

SENSORS (2022)

Article Chemistry, Analytical

Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity

Theyazn H. H. Aldhyani et al.

Summary: Rapid technological development has significantly changed the automotive industry, particularly in the transition of vehicles from machine-controlled to software-controlled technologies. However, the complexity of data and traffic behaviors still poses cybersecurity issues and weaknesses in the autonomous vehicle network. Developing a system capable of rapidly detecting message attacks in the controller area network (CAN) is a major challenge. This study presents a high-performance system that utilizes artificial intelligence and deep learning approaches to protect the vehicle network from cyber threats.

SENSORS (2022)

Review Computer Science, Interdisciplinary Applications

Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing

Said El Kafhali et al.

Summary: Cloud computing plays a crucial role in processing and storing data, but with the introduction of new technologies, cloud security issues are becoming increasingly complex. This paper provides a detailed overview of the architecture, security issues, and countermeasures of cloud computing, aiming to find solutions to address current and future challenges.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2022)

Article Computer Science, Information Systems

Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems

Hasan Alkahtani et al.

Summary: This research proposes an anomaly detection method for detecting cyberattacks in industrial control systems (ICSs) using artificial intelligence algorithms. The methodology incorporates various machine learning algorithms and deep learning networks, and was tested on real ICS datasets. The results demonstrate that the KNN and DT algorithms outperformed existing systems with high accuracy in binary classification and multiclass classification.

ELECTRONICS (2022)

Article Computer Science, Hardware & Architecture

The DDoS attacks detection through machine learning and statistical methods in SDN

Afsaneh Banitalebi Dehkordi et al.

Summary: The DDoS attack is a security challenge for SDN, with existing detection methods having limitations such as dependency on network topology and outdated datasets. A new method consisting of three sections has shown improved accuracy in detecting DDoS attacks in SDN.

JOURNAL OF SUPERCOMPUTING (2021)

Article Computer Science, Information Systems

An efficient feature reduction method for the detection of DoS attack

Deepak Kshirsagar et al.

Summary: The study suggests a feature reduction method by combining filter-based algorithms to enhance the performance of intrusion detection systems, achieving effective feature reduction for the CICIDS 2017 DoS dataset compared to current systems.

ICT EXPRESS (2021)

Article Computer Science, Information Systems

Optimized extreme learning machine for detecting DDoS attacks in cloud computing

Gopal Singh Kushwah et al.

Summary: This paper proposes a DDoS attack detection system based on an improved Self-adaptive evolutionary extreme learning machine (SaE-ELM), which achieves high detection accuracy on multiple datasets. The system shows significantly improved learning and classification capabilities, outperforming other techniques in performance.

COMPUTERS & SECURITY (2021)

Article Multidisciplinary Sciences

Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning

Ammar Aldallal et al.

Summary: This study proposed a hybrid intrusion detection system based on machine learning, combining support vector machine and genetic algorithm with an innovative fitness function. Results showed that the system outperformed benchmarks by up to 5.74% when tested on the CICIDS2017 dataset.

SYMMETRY-BASEL (2021)

Article Computer Science, Information Systems

Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications

Hasan Alkahtani et al.

Summary: In this study, a hybrid deep learning algorithm (CNN-LSTM) was proposed to detect botnet attacks on IoT devices. Extensive empirical research demonstrated the effectiveness of this algorithm in detecting botnet attacks across various IoT devices.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

EDoS-ADS: An Enhanced Mitigation Technique Against Economic Denial of Sustainability (EDoS) Attacks

Ahmad Shawahna et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2020)

Article Computer Science, Artificial Intelligence

An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm

M. R. Gauthama Raman et al.

ARTIFICIAL INTELLIGENCE REVIEW (2020)

Proceedings Paper Computer Science, Information Systems

DDoSNet: A Deep-Learning Model for Detecting Network Attacks

Mahmoud Said Elsayed et al.

2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020) (2020)

Article Business

DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids

Mohamed Amine Ferrag et al.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2020)

Article Computer Science, Information Systems

Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing

Kishwar Sadaf et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network

S. Manimurugan et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Dynamic Autoselection and Autotuning of Machine Learning Models for Cloud Network Analytics

Rupesh Raj Karn et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2019)

Article Computer Science, Information Systems

Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud

Trung Phan et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

LSTM-BA: DDoS Detection Approach Combining LSTM and Bayes

Yan Li et al.

2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD) (2019)

Article Automation & Control Systems

Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset

Naveen Bindra et al.

AUTOMATIC CONTROL AND COMPUTER SCIENCES (2019)

Article Computer Science, Theory & Methods

FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing

Sukhada Bhingarkar et al.

INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING (2018)

Article Physics, Multidisciplinary

Entropy-Based Economic Denial of Sustainability Detection

Marco Antonio Sotelo Monge et al.

ENTROPY (2017)

Article Computer Science, Information Systems

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

Chuanlong Yin et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

MLP-GA based algorithm to detect application layer DDoS attack

Khundrakpam Johnson Singh et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

DDoS in the IoT: Mirai and Other Botnets

Constantinos Kolias et al.

COMPUTER (2017)

Article Computer Science, Information Systems

Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges

Karanpreet Singh et al.

COMPUTERS & SECURITY (2017)

Article Multidisciplinary Sciences

Performance Modeling and Analysis of the EDoS-Shield Mitigation

F. Al-Haidari et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2017)

Article Computer Science, Hardware & Architecture

Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks

Zubair A. Baig et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Hardware & Architecture

DDoS attacks in cloud computing: Collateral damage to non-targets

Gaurav Somani et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Theory & Methods

Detection and defense of application-layer DDoS attacks in backbone web traffic

Wei Zhou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Proceedings Paper Computer Science, Hardware & Architecture

Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks Against Cloud Infrastructures

Zubair A. Baig et al.

2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA) (2013)

Article Remote Sensing

Random forest classifier for remote sensing classification

M Pal

INTERNATIONAL JOURNAL OF REMOTE SENSING (2005)

Article Ergonomics

Data mining of tree-based models to analyze freeway accident frequency

LY Chang et al.

JOURNAL OF SAFETY RESEARCH (2005)