DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment

N Joraviya, BN Gohil, UP Rao - The Journal of Supercomputing, 2024 - Springer
In the rapidly evolving IT industry, containerization has introduced new security challenges
including cloud data breaches. DL-HIDS explores the application of Deep Learning (DL) …

A novel hybrid framework for cloud intrusion detection system using system call sequence analysis

A Chaudhari, B Gohil, UP Rao - Cluster Computing, 2024 - Springer
Cloud Computing offers on-demand infrastructure, platform and software services over the
Internet on a pay-as-you-use model. Many e-commerce businesses and social networking …

Ab‐HIDS: An anomaly‐based host intrusion detection system using frequency of N‐gram system call features and ensemble learning for containerized environment

N Joraviya, BN Gohil, UP Rao - Concurrency and Computation …, 2024 - Wiley Online Library
Cloud's operating‐system‐level virtualization has introduced a new phase of lightweight
virtualization through containers. The architecture of cloud‐native and microservices‐based …

Estimation of Particle Froude Number in Deposited Bed Condition Using Hybrid Machine Learning Models

S Kumar, M Agarwal, V Deshpande - International Conference on …, 2023 - Springer
In hydrology, maintaining self-cleaning capabilities in drainage systems is crucial to prevent
sediment deposition at the bottom of channels. This deposition can disrupt the hydraulic …

Horse Herd optimization with deep learning based intrusion detection in cloud computing environment

S Nagamani, S Arivalagan, M Senthil… - International Journal of …, 2024 - Springer
The cloud offers applications, infrastructure, and storage services to consumers that must be
secure by some strategies. Hence, security in the cloud is to protect consumer data and …

Performance Evaluation of Thresholding-Based Segmentation Algorithms for Aerial Imagery

AD Bhattacharjee, S Dey, S Sarkar - International Conference on …, 2023 - Springer
The effectiveness of various threshold-based segmentation algorithms is examined in this
study utilizing aerial images, with a focus on accuracy metrics including intersection over …

A Survey of Intrusion Detection Methods in Wireless Networks

A Babaryka, I Katerynchuk, I Chesanovskyi - … lnternational Conference on …, 2022 - Springer
With the growing popularity of wireless networks, there is an urgent task of ensuring a high
level of their security. The broadband nature of radio waves determines the specifics of …

Efficient Intrusion Detection system in Cloud Computing environment using Deep Learning Algorithms

VV Ponnada - 2023 - norma.ncirl.ie
As the digital landscape evolves, the challenges faced by network specialists in the realm of
cloud communication and information intensify. The critical concern revolves around …