2023
DOI: 10.1155/2023/2039217
|View full text |Cite
|
Sign up to set email alerts
|

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

Abstract: Cloud computing is a vast revolution in information technology (IT) that inhibits scalable and virtualized sources to end users with low infrastructure cost and maintenance. They also have much flexibility and these resources are supervised by various management organizations and provided over the Internet by known standards, formats, and networking protocols. Legacy protocols and underlying technologies consist of vulnerabilities and bugs which open doors for intrusion by network attackers. Attacks as distrib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…The Azure service, within the realm of information technology, plays a crucial role in facilitating pharmaceutical compliance and change management. The present study aims to investigate the efficacy of Microsoft Azure Services as the exclusive solution for expediting GxP validation processes, specifically regarding certification acceleration and assistance provided to manufacturers in testing applications to meet specific standards [6].…”
Section: Methodsmentioning
confidence: 99%
“…The Azure service, within the realm of information technology, plays a crucial role in facilitating pharmaceutical compliance and change management. The present study aims to investigate the efficacy of Microsoft Azure Services as the exclusive solution for expediting GxP validation processes, specifically regarding certification acceleration and assistance provided to manufacturers in testing applications to meet specific standards [6].…”
Section: Methodsmentioning
confidence: 99%
“…Publishing Year Methodology Result [11] 2020 Deep CNN ensemble framework Detecting DDoS attacks effectively in SDNs [12] 2023 Optimisation-enabled deep learning-based DDoS attack detection Detecting DDoS attacks in cloud computing [13] 2022 Machine learning, mutual information Using RF to detect DDoS attacks RF feature importance method [14] 2021 Optimised extreme learning machine DDoS attack detection in cloud computing [15] 2022 Majority vote-based ensemble approach Detecting DDoS Attacks in cloud computing [16] 2020 Distributed deep learning system Detecting web attacks on edge devices [17] 2020 Fuzzy-Taylor-elephant herd optimization Deep Belief DDoS attack detection Inspired deep belief network [18] 2017 Machine learning techniques Cloud computing DDoS attack detection [19] 2022 Detection of DDoS attacks using IDS mechanism A review [20] 2021 Survey of authentication and privacy schemes Automotive ad hoc networks [21] 2022…”
Section: Refmentioning
confidence: 99%
“…Numerous additional uses in a diagnostic picture, depend on similar temporal properties. The method for obtaining these characteristics is presented in the study [4]. DDoS attack source traceback is an unsolved and difficult issue.…”
Section: Literature Reviewmentioning
confidence: 99%