Machine learning (ML)-centric resource management in cloud computing: A review and future directions

T Khan, W Tian, G Zhou, S Ilager, M Gong… - Journal of Network and …, 2022 - Elsevier
Cloud computing has rapidly emerged as a model for delivering Internet-based utility
computing services. Infrastructure as a Service (IaaS) is one of the most important and …

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system

MHL Louk, BA Tama - Expert Systems with Applications, 2023 - Elsevier
The mission of an intrusion detection system (IDS) is to monitor network activities and
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …

Machine learning and deep learning based intrusion detection in cloud environment: a review

A Vinolia, N Kanya… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Due to its open and dispersed nature, cloud computing (CC) faces several security-related
difficulties. As a result, it is weak and open to breaches that compromise the security …

Network intrusion detection of drones using recurrent neural networks

Y Sucharitha, PCS Reddy… - … : Future Trends and …, 2023 - Wiley Online Library
Summary Flying Ad Hoc Network (FANET) has obtained a great deal of interest over recent
times because of their significant applications. Thus, various examinations have been led on …

An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier

M Bakro, RR Kumar, A Alabrah, Z Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
The focus of cloud computing nowadays has been reshaping the digital epoch, in which
clients now face serious concerns about the security and privacy of their data hosted in the …

A novel network intrusion detection method based on metaheuristic optimisation algorithms

R Ghanbarzadeh, A Hosseinalipour… - Journal of ambient …, 2023 - Springer
The growing use of the Internet with its vulnerabilities has necessitated the adoption of
Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect …

An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework

S Sivamohan, SS Sridhar - Neural Computing and Applications, 2023 - Springer
Industry 4.0 enable novel business cases, such as client-specific production, real-time
monitoring of process condition and progress, independent decision making and remote …

A hybrid intrusion detection system based on feature selection and weighted stacking classifier

R Zhao, Y Mu, L Zou, X Wen - IEEE Access, 2022 - ieeexplore.ieee.org
Cyber-attacks occur more frequently with the rapid growth in the Internet. Intrusion detection
systems (IDS) have become an important part of protecting system security. There are still …

TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization

S Sivamohan, SS Sridhar, S Krishnaveni - Peer-to-Peer Networking and …, 2023 - Springer
Industrial cyber-physical systems (CPS) are vulnerable to cyberattacks that can compromise
their operations, safety, and security. Traditional intrusion detection systems are ineffective …

GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment

M Arunkumar, KA Kumar - International Journal of Information Technology, 2023 - Springer
Cloud computing is the most useful computing technology for the new service progression.
Due to the distributed nature of cloud computing, security threats and cyber attacks are …