Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model

A Ahmim, F Maazouzi, M Ahmim, S Namane… - IEEE …, 2023 - ieeexplore.ieee.org
As a result of the widespread adoption of the Internet of Things, there are now hundreds of
millions of connected devices, increasing the likelihood that they may be vulnerable to …

[HTML][HTML] Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art …

M Ouhssini, K Afdel, M Akouhar, E Agherrabi… - Egyptian Informatics …, 2024 - Elsevier
This comprehensive study examines cutting-edge strategies for combating Distributed
Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent …

Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques-Recent Research Advancements

A Abdallah, A Alkaabi, G Alameri, SH Rafique… - IEEE …, 2024 - ieeexplore.ieee.org
In the rapidly evolving landscape of computing and networking, the concepts of cloud
networks have gained significant prominence. Although the cloud network offers on-demand …

Robust DDoS Attack Detection Using Piecewise Harris Hawks Optimizer with Deep Learning for a Secure Internet of Things Environment

M Ragab, S M. Alshammari, LA Maghrabi, D Alsalman… - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) refers to the network of interconnected physical devices that are
embedded with software, sensors, etc., allowing them to exchange and collect information …

Utilizing Cloud Computing for Distributed Training of Deep Learning Models

S Dhanasekaran, K Rajput, N Yuvaraj… - … Conference on Data …, 2024 - ieeexplore.ieee.org
Cloud computing has emerged as a powerful solution for lots of computational
responsibilities, including system studying and deep getting to know. Deep knowledge of …

Dynamic weight reinforcement learning method considering multiple factors in mobile edge computing system

S Li, Y Zhou, X Liu, N Wang, J Wang, B Zhou, Z Wang - Neurocomputing, 2024 - Elsevier
The accelerated advancement of Mobile Edge Computing (MEC) has facilitated significant
progressions in digital medical diagnostic services. However, the multi-region, multi-user …

A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer

EI Elsedimy, H Elhadidy, SMM Abohashish - Cluster Computing, 2024 - Springer
Abstract The Internet of Things (IoT) has grown significantly in recent years, allowing devices
with sensors to share data via the internet. Despite the growing popularity of IoT devices …

DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates

M Nalini, B Yamini, P Sinthia - IETE Journal of Research, 2024 - Taylor & Francis
Network security faces challenges, including reduced true positives, increased false
positives, and inadequate anomaly detection efficacy. This paper introduces the …

Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Cloud Environments

MA Khan, MF Ab Razak, ZRBM Azmi… - Fusion: Practice and …, 2025 - americaspg.com
Abstract Distributed Denial of Service (DDoS) attacks pose a significant threat to cloud
computing environments, necessitating advanced detection methods. This review examines …

Intrusion Detection System for Detection of DDoS Attacks in Cloud Environment

V Jyothsna, C Manisha, BS NanduSri - 2023 - researchsquare.com
A modern technology which enables users to construct services on demand is cloud
computing. Due to its self-service functionality and on demand offerings, cloud computing …