IMIDS: An intelligent intrusion detection system against cyber threats in IoT
The increasing popularity of the Internet of Things (IoT) has significantly impacted our daily
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …
A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment
P Verma, S Tapaswi, WW Godfrey - Cluster Computing, 2021 - Springer
Abstract Distributed Denial of Service (DDoS) plays a significant role in threatening the
cloud-based services. DDoS is a kind of attack which targets the CPU, bandwidth and other …
cloud-based services. DDoS is a kind of attack which targets the CPU, bandwidth and other …
Comparative study of classification algorithms for cloud ids using nsl-kdd dataset in weka
S Farhat, M Abdelkader… - 2020 International …, 2020 - ieeexplore.ieee.org
Cloud based Intrusion Detection Systems (IDS) presented an effective way to increase the
detection rates of malicious activities in the past couple of years. However, the …
detection rates of malicious activities in the past couple of years. However, the …
Cloud computing security: a taxonomy, threat detection and mitigation techniques
Cloud Computing is a rapidly growing emerging technology in the IT environment. Internet-
based computing provides services like sharing resources eg network, storage, applications …
based computing provides services like sharing resources eg network, storage, applications …
[PDF][PDF] Detection of DDoS Attacks on Cloud Computing Environment Using Altered Convolutional Deep Belief Networks
S Sureshkumar, GKDP Venkatesan… - International Journal of …, 2023 - mecs-press.org
The primary benefits of Clouds are that they can elastically scale to meet variable demands
and provide corresponding environments for computing. Cloud infrastructures require …
and provide corresponding environments for computing. Cloud infrastructures require …
[HTML][HTML] Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Considering that smart vehicles are becoming interconnected through the Internet of
Vehicles, cybersecurity threats like Distributed Denial of Service (DDoS) attacks pose a …
Vehicles, cybersecurity threats like Distributed Denial of Service (DDoS) attacks pose a …
[图书][B] Cyber Malware: Offensive and Defensive Systems
This book provides the foundational aspects of malware attack vectors and appropriate
defense mechanisms against malware. The book equips readers with the necessary …
defense mechanisms against malware. The book equips readers with the necessary …
Malware mitigation in cloud computing architecture
SK Medaram, L Maglaras - Cyber Malware: Offensive and Defensive …, 2023 - Springer
Cloud computing is one of the decade's most trending discussions in information
technology. The cloud is not an array of software, hardware or services but a vast shared …
technology. The cloud is not an array of software, hardware or services but a vast shared …
An sdn-based decision tree detection (DTD) model for detecting DDoS attacks in cloud environment
R Sridaran - … Journal of Advanced Computer Science and …, 2022 - search.proquest.com
Abstract Detecting Distributed Denial of Service (DDoS) attacks has become a significant
security issue for various network technologies. This attack has to be detected to increase …
security issue for various network technologies. This attack has to be detected to increase …
Tcp syn flood (dos) attack prevention using spi method on csf: A poc
IPAE Pratama - Bulletin of Computer Science and Electrical …, 2020 - bcsee.org
TCP SYN Flood as one kind of Denial of Service (DoS) attack, still popular to flood the server
connection, by sending SYN packets to the target. Because of the risk caused by this attack …
connection, by sending SYN packets to the target. Because of the risk caused by this attack …