Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review

P Verma, N Bharot, JG Breslin… - Transactions on …, 2024 - Wiley Online Library
Cloud computing (CC) offers on‐demand computing and resources to users, and
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …

An adaptive detection framework based on artificial immune for IoT intrusion detection system

M Ma, G Yang, J He, W Fang - Applied Soft Computing, 2024 - Elsevier
Given the continual evolution of new network attack methodologies, defenders face the
imperative of constantly upgrading security defenses. Current security technologies, albeit …

A Bidirectional Differential Evolution Based Unknown Cyberattack Detection System

H Huang, T Li, B Li, W Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The evolving unknown cyberattacks, compounded by the widespread emerging
technologies (say 5G, Internet of Things, etc.), have rapidly expanded the cyber threat …

O-AIRS: Optimized Artificial Immune Recognition System

M Badr, B Khaled - Informatica, 2024 - informatica.si
Abstract Artificial Immune Recognition System (AIRS) offers a promising meta-heuristic
approach inspired by the human immune system for classification tasks. However …

[PDF][PDF] An Effective DOS Attack Detection Model in Cloud Using Artificial Bee Colony Optimization

JKSS Chandra - academia.edu
Denial of service (DOS) attack is a serious threat in the cloud which causes unavailability of
cloud services to genuine users. Firewalls alone are not able to detect DOS attack because …