Cognitive Analytics 2020
DOI: 10.4018/978-1-7998-2460-2.ch053
|View full text |Cite
|
Sign up to set email alerts
|

An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms

Abstract: This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify network threats. So, new and creative ways are needed to enhance intrusion detection system. This article addresses the source of the above issues through detecting an intrusion in cloud computing before it further disrupts normal network operations, because the complexity of ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…An attacker, by predicting the sequence numbers of a future packet in an active TCP session, can potentially inject malicious packets into the communication stream without either party's knowledge. This could allow unauthorized access to sensitive sessions, such as those for web applications or remote terminals [78], [79]. The vulnerability arises from the predictability of sequence numbers, which, in implementations where these numbers are not sufficiently randomized, can be guessed by an attacker through techniques like sniffing a few packets to infer the algorithm used for sequence number generation.…”
Section: Tcp Sequence Number Predictionmentioning
confidence: 99%
“…An attacker, by predicting the sequence numbers of a future packet in an active TCP session, can potentially inject malicious packets into the communication stream without either party's knowledge. This could allow unauthorized access to sensitive sessions, such as those for web applications or remote terminals [78], [79]. The vulnerability arises from the predictability of sequence numbers, which, in implementations where these numbers are not sufficiently randomized, can be guessed by an attacker through techniques like sniffing a few packets to infer the algorithm used for sequence number generation.…”
Section: Tcp Sequence Number Predictionmentioning
confidence: 99%
“…A S the backbone technology supporting modern intelligent mobile applications, Deep Neural Networks (DNNs) represent the most commonly adopted machine learning technique and have become increasingly popular. Benefited by the superior performance in feature extraction, DNN have witnessed widespread success in domains from computer vision [2], speech recognition [3] to natural language processing [4] and big data analysis [5]. Unfortunately, today's mobile devices generally fail to well support these DNN-based applications due to the tremendous amount of computation required by DNN-based applications.…”
Section: Introductionmentioning
confidence: 99%
“…The intrusions that have occurred in any host machine of the local system are monitored by HIDS. When analyzing, the logging data of the host machine is utilized to test whether there are uncertainties from the normal behavior 8,9 . NIDS audits the network traffic over a network looking for a dubious activity that can be an attack or prohibited activity.…”
Section: Introductionmentioning
confidence: 99%