Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model
As a result of the widespread adoption of the Internet of Things, there are now hundreds of
millions of connected devices, increasing the likelihood that they may be vulnerable to …
millions of connected devices, increasing the likelihood that they may be vulnerable to …
[HTML][HTML] Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art …
M Ouhssini, K Afdel, M Akouhar, E Agherrabi… - Egyptian Informatics …, 2024 - Elsevier
This comprehensive study examines cutting-edge strategies for combating Distributed
Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent …
Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent …
Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques-Recent Research Advancements
A Abdallah, A Alkaabi, G Alameri, SH Rafique… - IEEE …, 2024 - ieeexplore.ieee.org
In the rapidly evolving landscape of computing and networking, the concepts of cloud
networks have gained significant prominence. Although the cloud network offers on-demand …
networks have gained significant prominence. Although the cloud network offers on-demand …
Robust DDoS Attack Detection Using Piecewise Harris Hawks Optimizer with Deep Learning for a Secure Internet of Things Environment
The Internet of Things (IoT) refers to the network of interconnected physical devices that are
embedded with software, sensors, etc., allowing them to exchange and collect information …
embedded with software, sensors, etc., allowing them to exchange and collect information …
Utilizing Cloud Computing for Distributed Training of Deep Learning Models
S Dhanasekaran, K Rajput, N Yuvaraj… - … Conference on Data …, 2024 - ieeexplore.ieee.org
Cloud computing has emerged as a powerful solution for lots of computational
responsibilities, including system studying and deep getting to know. Deep knowledge of …
responsibilities, including system studying and deep getting to know. Deep knowledge of …
Dynamic weight reinforcement learning method considering multiple factors in mobile edge computing system
S Li, Y Zhou, X Liu, N Wang, J Wang, B Zhou, Z Wang - Neurocomputing, 2024 - Elsevier
The accelerated advancement of Mobile Edge Computing (MEC) has facilitated significant
progressions in digital medical diagnostic services. However, the multi-region, multi-user …
progressions in digital medical diagnostic services. However, the multi-region, multi-user …
A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer
EI Elsedimy, H Elhadidy, SMM Abohashish - Cluster Computing, 2024 - Springer
Abstract The Internet of Things (IoT) has grown significantly in recent years, allowing devices
with sensors to share data via the internet. Despite the growing popularity of IoT devices …
with sensors to share data via the internet. Despite the growing popularity of IoT devices …
DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates
Network security faces challenges, including reduced true positives, increased false
positives, and inadequate anomaly detection efficacy. This paper introduces the …
positives, and inadequate anomaly detection efficacy. This paper introduces the …
Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Cloud Environments
MA Khan, MF Ab Razak, ZRBM Azmi… - Fusion: Practice and …, 2025 - americaspg.com
Abstract Distributed Denial of Service (DDoS) attacks pose a significant threat to cloud
computing environments, necessitating advanced detection methods. This review examines …
computing environments, necessitating advanced detection methods. This review examines …
Intrusion Detection System for Detection of DDoS Attacks in Cloud Environment
V Jyothsna, C Manisha, BS NanduSri - 2023 - researchsquare.com
A modern technology which enables users to construct services on demand is cloud
computing. Due to its self-service functionality and on demand offerings, cloud computing …
computing. Due to its self-service functionality and on demand offerings, cloud computing …