2019
DOI: 10.1002/cpe.5226
|View full text |Cite
|
Sign up to set email alerts
|

Improved cuckoo search load distribution (ICS‐LD) and attack detection in cloud environment

Abstract: Summary For the purpose of obtaining an answer to a spoofing IP issue and related problems in the cloud computing (CC) environment, a novel path identifier is recommended, in which a new packet approach with a new identifier (ID) is produced to every user or client system. For the purpose of identification of the spoofing attack, any watermark image pattern is introduced. Following this, the hypervisor is employed to ascertain plausible trust relationships among the VMs by considering personal sources that can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 33 publications
0
0
0
Order By: Relevance
“…As the classification, a fuzzy extreme learning machine (FELM) is used. The CloudSim simulator is used for the implementation [20].…”
Section: Literature Surveymentioning
confidence: 99%
“…As the classification, a fuzzy extreme learning machine (FELM) is used. The CloudSim simulator is used for the implementation [20].…”
Section: Literature Surveymentioning
confidence: 99%