Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions

A Bhardwaj, V Mangat, R Vig, S Halder… - Computer Science Review, 2021 - Elsevier
Cloud computing model provides on demand, elastic and fully managed computer system
resources and services to organizations. However, attacks on cloud components can cause …

Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks

P Kumar, A Baliyan, KR Prasad… - Wireless …, 2022 - Wiley Online Library
A number of disadvantages of traditional networks may be attributed to the close relationship
that exists between the control plane and the data plane inside proprietary hardware …

Detection of DDOS attack using deep learning model in cloud storage application

A Agarwal, M Khari, R Singh - Wireless Personal Communications, 2022 - Springer
In recent years, distributed denial of service (DDoS) attacks pose a serious threat to network
security. How to detect and defend against DDoS attacks is currently a hot topic in both …

A survey and classification of the security anomaly detection mechanisms in software defined networks

T Jafarian, M Masdari, A Ghaffari, K Majidzadeh - Cluster Computing, 2021 - Springer
Software defined network (SDN) decouples the network control and data planes. Despite
various advantages of SDNs, they are vulnerable to various security attacks such anomalies …

Detecting network cyber-attacks using an integrated statistical approach

B Bouyeddou, F Harrou, B Kadri, Y Sun - Cluster Computing, 2021 - Springer
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and
safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical …

Machine learning and deep learning based intrusion detection in cloud environment: a review

A Vinolia, N Kanya… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Due to its open and dispersed nature, cloud computing (CC) faces several security-related
difficulties. As a result, it is weak and open to breaches that compromise the security …

A systematic review on anomaly detection for cloud computing environments

T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …

An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments

S Mahdavi Hezavehi, R Rahmani - Cluster Computing, 2020 - Springer
Today, the providers of cloud computing services are among the most prominent service
suppliers worldwide. Availability of cloud services is one of the most important concerns of …

Scef: a model for prevention of ddos attacks from the cloud

GI Shidaganti, AS Inamdar, SV Rai… - International Journal of …, 2020 - igi-global.com
Distributed denial of service (DDoS) attacks are some of the biggest threats to network
performance and security today. With the advent of cloud computing, these attacks can be …