A comprehensive survey on DDoS defense systems: New trends and challenges

Q Li, H Huang, R Li, J Lv, Z Yuan, L Ma, Y Han… - Computer Networks, 2023 - Elsevier
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …

An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning

OA Alghanam, W Almobaideen, M Saadeh… - Expert Systems with …, 2023 - Elsevier
With the rapid growth of the number of connected devices that exchange personal, sensitive,
and important data through the IoT based global network, attacks that are targeting security …

An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique

M Mayuranathan, SK Saravanan, B Muthusenthil… - … in Engineering Software, 2022 - Elsevier
Users have been urged to embrace a cloud-based environment by recent technologies and
advancements. Because of the dispersed nature of cloud solutions, security is a major …

Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review

P Verma, N Bharot, JG Breslin… - Transactions on …, 2024 - Wiley Online Library
Cloud computing (CC) offers on‐demand computing and resources to users, and
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …

Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model

A Ahmim, F Maazouzi, M Ahmim, S Namane… - IEEE …, 2023 - ieeexplore.ieee.org
As a result of the widespread adoption of the Internet of Things, there are now hundreds of
millions of connected devices, increasing the likelihood that they may be vulnerable to …

Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model

M Bakro, RR Kumar, M Husain, Z Ashraf, A Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …

Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables …

KG Maheswari, C Siva, G Nalinipriya - Computer Communications, 2023 - Elsevier
Abstract Information technology organizations have experienced rapid growth in recent
years, resulting in scalability, mobility, and flexibility challenges. Those organizations move …

[HTML][HTML] Distributed denial of service attack detection in E-government cloud via data clustering

FJ Abdullayeva - Array, 2022 - Elsevier
One of the main essential security issues of cloud computing is the detection and prevention
of network intrusions. The gaps in the network directly affect the security of the cloud as it is …

Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection

F Safarov, M Basak, R Nasimov, A Abdusalomov… - Future Internet, 2023 - mdpi.com
In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures
has become a paramount concern across diverse fields. Among the numerous cyber threats …

MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping

L Xie, B Yuan, H Yang, Z Hu, L Jiang, L Zhang… - Computer standards & …, 2024 - Elsevier
To address the slow response time of existing detection modules to the Internet of Things
(IoT) Distributed Denial of Service (DDoS) attacks, along with their low feature differentiation …