Distributed frameworks for detecting distributed denial of service attacks: a comprehensive review, challenges and future directions

NV Patil, C Rama Krishna… - … and Computation: Practice …, 2021 - Wiley Online Library
A distributed denial of service (DDoS) attack is a significant threat to web‐based
applications and hindering legitimate traffic (denies access to benign users) by …

Performance analysis of machine learning algorithms for big data classification: Ml and ai-based algorithms for big data analysis

SK Punia, M Kumar, T Stephan… - International Journal of …, 2021 - igi-global.com
In broad, three machine learning classification algorithms are used to discover correlations,
hidden patterns, and other useful information from different data sets known as big data …

[HTML][HTML] SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks

NV Patil, CR Krishna, K Kumar - Cluster Computing, 2022 - Springer
Distributed denial of service (DDoS) is an immense threat for Internet based-applications
and their resources. It immediately floods the victim system by transmitting a large number of …

[HTML][HTML] KS-DDoS: Kafka streams-based classification approach for DDoS attacks

NV Patil, CR Krishna, K Kumar - The Journal of Supercomputing, 2022 - Springer
A distributed denial of service (DDoS) attack is the most destructive threat for internet-based
systems and their resources. It stops the execution of victims by transferring large numbers …

[HTML][HTML] Information security for big data using the NTRUEncrypt method

MK Yousif, ZE Dallalbashi, SW Kareem - Measurement: Sensors, 2023 - Elsevier
Cloud computing processes vast quantities of data and offers a variety of flexible, secure, on-
demand, and cost-effective collaboration options for consumers. Due to the increasing …

[PDF][PDF] An approach for enhancing data confidentiality in hadoop

SW Kareem, RZ Yousif… - Indonesian Journal of …, 2020 - pdfs.semanticscholar.org
The quantity of prepared and stored data in the cloud is rising dramatically. The common
storage devices at both hardware and software levels cannot satisfy the necessity of the …

[PDF][PDF] Enhancing approach using hybrid pailler and RSA for information security in bigdata

SMJ Abdalwahid, RZ Yousif… - Applied Computer …, 2019 - bibliotekanauki.pl
The amount of data processed and stored in the cloud is growing dramatically. The
traditional storage devices at both hardware and software levels cannot meet the …

Secure Cloud Approach Based on Okamoto-Uchiyama Cryptosystem.

SW KAREEM - Journal of Applied Computer Science & …, 2020 - search.ebscohost.com
The enormous data performed within Cloud computing because of its strength to present
users among adjustable, safe, on-demand, and low-cost co-operation. Among the rising …

A real-time fault tolerant and scalable recommender system design based on Kafka

C Choudhary, I Singh, M Kumar - 2022 IEEE 7th International …, 2022 - ieeexplore.ieee.org
A recommender system based on offline batch processing has the benefit of being precise in
its computation and having a high level of fault tolerance. However, because of the huge …

Application of Hadoop cloud platform based on soft computing in financial accounting budget control

Z Shuxiang - Soft Computing, 2023 - Springer
This article designs a Hadoop cloud platform system based on soft computing, and makes
optimization research on its budget control application in financial accounting, stabilizing its …