Lipsa et al., 2022 - Google Patents
A novel dimensionality reduction strategy based on linear regression with a fine-pruned decision tree classifier for detecting DDoS attacks in cloud computing …Lipsa et al., 2022
- Document ID
- 6752913146488549866
- Author
- Lipsa S
- Dash R
- Publication year
- Publication venue
- International Symposium on Artificial Intelligence
External Links
Snippet
Cloud computing is a rapidly evolving technology that strives to minimize maintenance and management expenses by relocating high-performance computing infrastructure to the Internet. Despite its numerous advantages, it faces a myriad of security challenges. This …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aksu et al. | Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm | |
Hamed et al. | A survey and taxonomy of classifiers of intrusion detection systems | |
Devaraju et al. | Performance comparison for intrusion detection system using neural network with KDD dataset | |
Arshi et al. | A survey of DDoS attacks using machine learning techniques | |
Pérez et al. | Comparison of network intrusion detection performance using feature representation | |
Yusof et al. | An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack | |
Elhanashi et al. | Machine learning techniques for anomaly-based detection system on CSE-CIC-IDS2018 dataset | |
Singh Samom et al. | Distributed denial of service (DDoS) attacks detection: A machine learning approach | |
Puthran et al. | Intrusion detection using improved decision tree algorithm with binary and quad split | |
Maheswaran et al. | Hybrid intrusion detection system using machine learning algorithm | |
Chapaneri et al. | Multi-level Gaussian mixture modeling for detection of malicious network traffic | |
Kshirsagar et al. | [Retracted] Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm | |
Kshirsagar et al. | Identifying reduced features based on ig-threshold for dos attack detection using part | |
Chaithanya et al. | An efficient intrusion detection approach using enhanced random forest and moth-flame optimization technique | |
Lipsa et al. | A novel dimensionality reduction strategy based on linear regression with a fine-pruned decision tree classifier for detecting DDoS attacks in cloud computing environments | |
Balogun et al. | Cascade generalization based functional tree for website phishing detection | |
van Staden et al. | An evaluation of machine learning methods for classifying bot traffic in software defined networks | |
Elsedimy et al. | A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer | |
Gupta et al. | An efficient federated learning based intrusion detection system using LS2DNN with PBKA based lightweight privacy preservation in cloud server | |
Nanda et al. | Intrusion detection and classification using decision tree-based feature selection classifiers | |
Akash et al. | Predicting cyber-attacks on iot networks using deep-learning and different variants of smote | |
Ahmed et al. | Investigating deep learning for collective anomaly detection-an experimental study | |
Hussein et al. | IoT intrusion detection using modified random forest based on double feature selection methods | |
Ramprasath et al. | Cloud service anomaly traffic detection using random forest | |
Dalai et al. | Hybrid network intrusion detection systems: a decade’s perspective |