2023
DOI: 10.11591/ijece.v13i4.pp4452-4466
|View full text |Cite
|
Sign up to set email alerts
|

A new algorithm to enhance security against cyber threats for internet of things application

Abstract: <p>One major problem is detecting the unsuitability of traffic caused by a distributed  denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
(31 reference statements)
0
2
0
Order By: Relevance
“…IDS in the cloud relies on advanced algorithms and machine learning techniques to analyze massive datasets and detect patterns indicative of malicious activity. Timely and accurate intrusion detection is essential for ensuring the confidentiality, integrity, and availability (CIA) of data stored and processed within cloud environments, contributing to the overall security posture of cloudbased systems [17], [18]. The elements comprising the IDS, as depicted in Figure 1, work in tandem to aid organizations in detecting and addressing security incidents, thereby fortifying their overall cybersecurity stance.…”
Section: The Comprehensive Theoretical Basismentioning
confidence: 99%
“…IDS in the cloud relies on advanced algorithms and machine learning techniques to analyze massive datasets and detect patterns indicative of malicious activity. Timely and accurate intrusion detection is essential for ensuring the confidentiality, integrity, and availability (CIA) of data stored and processed within cloud environments, contributing to the overall security posture of cloudbased systems [17], [18]. The elements comprising the IDS, as depicted in Figure 1, work in tandem to aid organizations in detecting and addressing security incidents, thereby fortifying their overall cybersecurity stance.…”
Section: The Comprehensive Theoretical Basismentioning
confidence: 99%
“…Presently, the escalating number and interconnectivity of computers, coupled with the escalating complexity of systems and their facile extensibility, contribute to the escalating incidence of malware infections daily. A prominent and perilous menace to organizational integrity is ransomware [1], [2]. This insidious form of malicious software effectively takes control of a computer system, encrypts files on the hard drive, or forces the computer to shut down, demanding a ransom in return for restoring normal functionality and obstructing user access to the system.…”
Section: Introductionmentioning
confidence: 99%