Machine learning for misuse-based network intrusion detection: overview, unified evaluation and feature choice comparison framework

L Le Jeune, T Goedeme, N Mentens - Ieee Access, 2021 - ieeexplore.ieee.org
Network Intrusion detection systems are essential for the protection of advanced
communication networks. Originally, these systems were hard-coded to identify specific …

Machine learning and deep learning based intrusion detection in cloud environment: a review

A Vinolia, N Kanya… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Due to its open and dispersed nature, cloud computing (CC) faces several security-related
difficulties. As a result, it is weak and open to breaches that compromise the security …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment

DK Jain, W Ding, K Kotecha - International Journal of Machine Learning …, 2023 - Springer
Cloud computing (CC) has become one of the prominent technologies because of the
significant utility services, which focus on outsourcing data to companies and individual …

[HTML][HTML] Hybridized classification algorithms for data classification applications: A review

F Sherwani, B Ibrahim, MM Asad - Egyptian Informatics Journal, 2021 - Elsevier
Abstract Machine-based classification usually involves some computer programs, known as
algorithms, developed using several mathematical formulations to accelerate the automated …

Recurrent and deep learning neural network models for DDoS attack detection

S Sumathi, R Rajesh, S Lim - Journal of Sensors, 2022 - Wiley Online Library
Distributed denial of service (DDoS) attack is a subclass of denial of service attack that
performs severe attack in a cloud computing environment. It makes a malicious attempt to …

[PDF][PDF] Enhanced coyote optimization with deep learning based cloud-intrusion detection system

AM Basahel, M Yamin, SM Basahel… - Computers, Materials & …, 2023 - academia.edu
Cloud Computing (CC) is the preference of all information technology (IT) organizations as it
offers pay-per-use based and flexible services to its users. But the privacy and security …

Selection of a rational composition of information protection means using a genetic algorithm

V Lakhno, B Akhmetov, O Smirnov… - … and Virtual Mobile …, 2022 - Springer
This article describes a modified genetic algorithm (MGA) for solving a multicriteria
optimization problem for the selection and optimization of the information security means …

A Modified Hybrid Method Based on PSO, GA, and K‐Means for Network Anomaly Detection

Y Yuan, Y Li - Mathematical Problems in Engineering, 2022 - Wiley Online Library
Data anomaly detection plays a vital role in protecting network security and developing
network technology. Aiming at the detection problems of large data volume, complex …

[Retracted] Decision‐Making Model of Product Modeling Big Data Design Scheme Based on Neural Network Optimized by Genetic Algorithm

M Hu - Computational Intelligence and Neuroscience, 2021 - Wiley Online Library
At present, machine learning artificial neural network technology, as one of the core
technologies of enterprises, has received unprecedented attention. This technology is …