2022
DOI: 10.1016/j.ijleo.2022.170044
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED: An intrusion identification and prevention for cloud computing: From the perspective of deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…But when the number or relative size of the criteria increases, the performance stability and consequently the group decreases. To solve such problems, this study uses horizontal, vertical, and oblique pair comparisons, the algorithm being determined by several criteria through an incomplete linguistic custom relationship model [16]. Multiple decision-making criteria can meet the requirement.…”
Section: Multi-criteria Decision Makingmentioning
confidence: 99%
“…But when the number or relative size of the criteria increases, the performance stability and consequently the group decreases. To solve such problems, this study uses horizontal, vertical, and oblique pair comparisons, the algorithm being determined by several criteria through an incomplete linguistic custom relationship model [16]. Multiple decision-making criteria can meet the requirement.…”
Section: Multi-criteria Decision Makingmentioning
confidence: 99%
“…Traditional approaches are based on statistical or rule‐based methods 7 to detect network anomalies and do not effectively handle complex and dynamic network traffic. In this case, network intrusion detection systems have played a paramount role in protecting computer networks, detecting and preventing unauthorized access, malicious attacks, data breaches, and potential cyber threats within computer networks in real time 4,5,8,9 . In addition, NIDS is one of the crucial components of comprehensive network security.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the NIDS is associated with cloud computing, which is challenging to secure from malicious actions by attackers 12 . Thus, ensuring cloud information using an effective intrusion detection system is essential 9 . Nevertheless, the traditional approaches like firewalls, anti‐viruses, and encryption‐decryption methods 5,13 are insufficient to catch the complex denial of service attacks (DoS) 9,14 and distributed denial of service attacks (DDoS) 13 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The second part is cloud's backend, which is made up of multiple servers and is the cloud itself. The second defence layer of a system includes intrusion detection systems (IDS).IDSs can discern between lawful and unlawful conduct using patterns of good traffic, typical behaviour, or particular rules that describe an assault.In contrast to conventional IDSs that might not be as successful against contemporary sophisticated cyberattacks, data mining, which is utilized to describe knowledge discovery, can help implement as well as deploy IDSs with higher accuracy as well as robust behaviour.Reliable datasets that I contain both benign and many attacks, (ii) meet real-world requirements, and (iii) are publically available are required in order to verify the effectiveness of such techniques [5].As first line of protection for computer security, the conventional preventative measures such user authentication, data encryption, avoiding programming errors, and firewalls are used. User authentication cannot stop illegal use in the case that a password is weak and hacked.Firewalls are susceptible to configuration mistakes and unclear or undefinable security policies.…”
Section: Introductionmentioning
confidence: 99%