Rexha et al., 2023 - Google Patents
Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms.Rexha et al., 2023
- Document ID
- 1789672855878446004
- Author
- Rexha B
- Thaqi R
- Mazrekaj A
- Vishi K
- Publication year
- Publication venue
- International Journal of Online & Biomedical Engineering
External Links
Snippet
Cloud computing has gained significant popularity due to its reliability and scalability, making it a compelling area of research. However, this technology is not without its challenges, including network connectivity dependencies, downtime, vendor lock-in, limited …
- 238000004422 calculation algorithm 0 title abstract description 64
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Koroniotis et al. | Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset | |
Idhammad et al. | Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest | |
Kirubavathi et al. | Botnet detection via mining of traffic flow characteristics | |
Bagui et al. | Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset | |
Pastor et al. | Detection of encrypted cryptomining malware connections with machine and deep learning | |
Muthamil Sudar et al. | A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4. 5 technique | |
Fraunholz et al. | Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot | |
Biswas et al. | Botnet traffic identification using neural networks | |
Batool et al. | [Retracted] Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment | |
Ali et al. | Effective network intrusion detection using stacking-based ensemble approach | |
Ozkan-Okay et al. | SABADT: hybrid intrusion detection approach for cyber attacks identification in WLAN | |
Le et al. | Unsupervised monitoring of network and service behaviour using self organizing maps | |
Hynek et al. | Refined detection of SSH brute-force attackers using machine learning | |
Hamza et al. | Iot botnet detection: Challenges and issues | |
Cambiaso et al. | A network traffic representation model for detecting application layer attacks | |
Rexha et al. | Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms. | |
Alsulami et al. | IoT Protocol-Enabled IDS based on Machine Learning | |
Mashaleh et al. | A proposed framework for early detection IoT botnet | |
Catak | Two-layer malicious network flow detection system with sparse linear model based feature selection | |
Sukhni et al. | A systematic analysis for botnet detection using genetic algorithm | |
Abirami et al. | Proactive network packet classification using artificial intelligence | |
Raj et al. | Iot botnet detection using various one-class classifiers | |
Mateus et al. | Federated Learning-Based Solution for DDoS Detection in SDN | |
Abdulla et al. | Setting a worm attack warning by using machine learning to classify netflow data | |
Raheja et al. | Rule‐Based Approach for Botnet Behavior Analysis |