[引用][C] Adaptive model to detect anomaly and real-time attacks in cloud environment using data mining algorithm

D Sakthivel, B Radha - International Journal of Performability …, 2021 - ijpe-online.com
The potential benefits and enhancement of services have made cloud computing an
attractive field in the current era. Cloud computing has various benefits that has grabbed a …

Mathematically Modified Adaptive Neuro-Fuzzy Inference System for an Intelligent Cyber Security System

D Marimuthu, GRK Rao, A Mehbodniya… - SN Computer …, 2023 - Springer
Cybersecurity is defending sensitive information and crucial systems against Internet
attacks. Cyber-Physical Systems (CPS) and the Internet of Things (IoT) are becoming …

Evaluation of Machine Learning Algorithms using Feature Selection Methods for Network Intrusion Detection Systems

MN Reza, SF Kabir, N Jahan… - 2021 5th International …, 2021 - ieeexplore.ieee.org
In this modern internet era dominated by technology and automation, network security is a
concern for the whole world. Despite many security methods such as virus scanners …

Network-based Intrusion Detection System for Preventing the Cloud Computing Environment from Cyber-Attacks using Deep Learning Algorithms

SU Thombre - 2022 - norma.ncirl.ie
In the current era, cloud computing is considered the most widespread source of storage,
computation and communication because of its reliability and considered a safe place to …

Towards in-network generalized trustworthy data collection for trustworthy cyber-physical systems

HU Rahman, G Wang, MZA Bhuiyan, J Chen - Dependability in Sensor …, 2019 - Springer
Data trustworthiness (ie, the data is free from error, up to date, and originate from a reputable
source) is always preferred. However, due to environmental influence (ie, equipment faults …

Gri kurt optimizasyon (GKO) algoritması ve yapay sinir ağı (YSA) kullanılarak hibrit bulut tabanlı saldırı tespit ve yanıt sistemi

IM Nur - 2021 - gcris.ktun.edu.tr
Teknoloji hızla büyümekte ve bulut bilişim kullanımı da aynı hızla artmaktadır. Bugünlerde
irili ve ufaklı şirketlerin çoğu bulutu kullanmaktadır. Bulut bilişim, kullandıkça öde mantığıyla …

Intrusion detection system using machine learning for SDN environment

PA Jishiya, KP Swaraj - AIP Conference Proceedings, 2024 - pubs.aip.org
Software Defined Networking (SDN) is the considered to be the next face of Internet. By
decoupling control and data plane it provides a global network that can be controlled …

Comparative analysis of reduced feature set based ML models for IDS

PA Jishiya, KP Swaraj, A James - AIP Conference Proceedings, 2023 - pubs.aip.org
Cyber-attacks targeting organisations and individuals are getting worse day by day. With the
technological improvements, the principles used to launch attacks are also varied. Intrusion …

A Machine Learning Approach to Analyze Cloud Computing Attacks

S Rani, K Tripathi, Y Arora… - 2022 5th International …, 2022 - ieeexplore.ieee.org
A Cloud Computing model enables convenient, on demand network access, otherwise
known as cloud computing (CC) or" the Cloud". Cloud computing is delivered via internet …

Effective fault detection approach for cloud computing

P Ashritha, M Banusri, R Namitha… - Journal of physics …, 2021 - iopscience.iop.org
In cloud computing, accessibility to data anytime is crucial, acquiring data and maintaining
that data without any loss or incursion is an essential task. A cloud service must have the …