2021 IEEE International Conference on Consumer Electronics (ICCE) 2021
DOI: 10.1109/icce50685.2021.9427665
|View full text |Cite
|
Sign up to set email alerts
|

Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…The existing trust management schemes [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]44,45,51,52 failed to fulfill the most fundamental requirement for industrial WSN (ICN). Finally, after sincerely analyzing existing work, we can say that without considering indirect (feedback or reputation) trust, frequency of misbehavior, current, and past misbehavior, a malicious node might disguise the network to ruin its reputation 38 and remain not detected as well as trustworthy [46][47][48][49][50] . The survival of ICNs is highly dependent on the successful cooperation of tamper-resistant SNs 3 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…The existing trust management schemes [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]44,45,51,52 failed to fulfill the most fundamental requirement for industrial WSN (ICN). Finally, after sincerely analyzing existing work, we can say that without considering indirect (feedback or reputation) trust, frequency of misbehavior, current, and past misbehavior, a malicious node might disguise the network to ruin its reputation 38 and remain not detected as well as trustworthy [46][47][48][49][50] . The survival of ICNs is highly dependent on the successful cooperation of tamper-resistant SNs 3 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…The previous section defines different DDoS attack techniques and different attack tools which are generally used by attackers to initiate a DDoS attack. However, there are also many DDoS defense techniques 56–58 that can detect different DDoS attacks, 59–62 such as AI, 63–65 cryptography, 66 machine learning 67,68 . DDoS defense techniques are broadly differentiated into three groups 69 …”
Section: Ddos Attack Detection Techniquesmentioning
confidence: 99%
“…However, there are also many DDoS defense techniques [56][57][58] that can detect different DDoS attacks, [59][60][61][62] such as AI, [63][64][65] cryptography, 66 machine learning. 67,68 DDoS defense techniques are broadly differentiated into three groups. 69 (1) Attack prevention techniques.…”
Section: Ddos Attack Detection Techniquesmentioning
confidence: 99%
“…Privacy and security go hand in hand though this paper is privacy-focused with the advent of technologies like cloud computing, IoT, etc. The data collected or stored by IoT devices face both security & privacy threats, e.g., eavesdropping, DDoS attack, etc., as the information gets shared across different objects leading to several issues such as data breaches as these technologies are also prone to security vulnerabilities with outdated software versions (Mishra et al 2021, Tewari & Gupta 2020.…”
Section: Literature Reviewmentioning
confidence: 99%