2023
DOI: 10.32604/cmc.2023.028796
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN

Abstract: Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 27 publications
0
1
0
1
Order By: Relevance
“…The modular API is designed to seamlessly integrate a diverse array of machine learning models to enhance threat detection within a private cloud environment. The selected models, including random forest [28,29], support vector machines [28,30], neural networks [31,32], k-nearest neighbors [33,34], decision tree [35,36], stochastic gradient descent [37,38], naive Bayes [39,40], logistic regression [41,42], gradient boosting [41,[43][44][45] and AdaBoost [46], each bring unique capabilities to the framework. Random forest's robustness is rigorously assessed for identifying network anomalies, while support vector machines focus on precise threat identification with minimal false positives.…”
Section: Machine Learning Model Evaluationmentioning
confidence: 99%
“…The modular API is designed to seamlessly integrate a diverse array of machine learning models to enhance threat detection within a private cloud environment. The selected models, including random forest [28,29], support vector machines [28,30], neural networks [31,32], k-nearest neighbors [33,34], decision tree [35,36], stochastic gradient descent [37,38], naive Bayes [39,40], logistic regression [41,42], gradient boosting [41,[43][44][45] and AdaBoost [46], each bring unique capabilities to the framework. Random forest's robustness is rigorously assessed for identifying network anomalies, while support vector machines focus on precise threat identification with minimal false positives.…”
Section: Machine Learning Model Evaluationmentioning
confidence: 99%
“…Ancaman terhadap keamanan siber semakin kompleks. Aplikasi perlu dilindungi dari berbagai serangan siber yang mungkin terjadi, seperti serangan DDoS, SQL Injection, serta eksploitasi kerentanan [4].…”
Section: Pendahuluanunclassified