[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Lipsa et al., 2022 - Google Patents

A novel dimensionality reduction strategy based on linear regression with a fine-pruned decision tree classifier for detecting DDoS attacks in cloud computing …

Lipsa et al., 2022

Document ID
6752913146488549866
Author
Lipsa S
Dash R
Publication year
Publication venue
International Symposium on Artificial Intelligence

External Links

Snippet

Cloud computing is a rapidly evolving technology that strives to minimize maintenance and management expenses by relocating high-performance computing infrastructure to the Internet. Despite its numerous advantages, it faces a myriad of security challenges. This …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • G06F17/30507Applying rules; deductive queries

Similar Documents

Publication Publication Date Title
Aksu et al. Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm
Hamed et al. A survey and taxonomy of classifiers of intrusion detection systems
Devaraju et al. Performance comparison for intrusion detection system using neural network with KDD dataset
Arshi et al. A survey of DDoS attacks using machine learning techniques
Pérez et al. Comparison of network intrusion detection performance using feature representation
Yusof et al. An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Elhanashi et al. Machine learning techniques for anomaly-based detection system on CSE-CIC-IDS2018 dataset
Singh Samom et al. Distributed denial of service (DDoS) attacks detection: A machine learning approach
Puthran et al. Intrusion detection using improved decision tree algorithm with binary and quad split
Maheswaran et al. Hybrid intrusion detection system using machine learning algorithm
Chapaneri et al. Multi-level Gaussian mixture modeling for detection of malicious network traffic
Kshirsagar et al. [Retracted] Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm
Kshirsagar et al. Identifying reduced features based on ig-threshold for dos attack detection using part
Chaithanya et al. An efficient intrusion detection approach using enhanced random forest and moth-flame optimization technique
Lipsa et al. A novel dimensionality reduction strategy based on linear regression with a fine-pruned decision tree classifier for detecting DDoS attacks in cloud computing environments
Balogun et al. Cascade generalization based functional tree for website phishing detection
van Staden et al. An evaluation of machine learning methods for classifying bot traffic in software defined networks
Elsedimy et al. A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer
Gupta et al. An efficient federated learning based intrusion detection system using LS2DNN with PBKA based lightweight privacy preservation in cloud server
Nanda et al. Intrusion detection and classification using decision tree-based feature selection classifiers
Akash et al. Predicting cyber-attacks on iot networks using deep-learning and different variants of smote
Ahmed et al. Investigating deep learning for collective anomaly detection-an experimental study
Hussein et al. IoT intrusion detection using modified random forest based on double feature selection methods
Ramprasath et al. Cloud service anomaly traffic detection using random forest
Dalai et al. Hybrid network intrusion detection systems: a decade’s perspective