2021
DOI: 10.53409/mnaa/jcsit/2201
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Attacks Classification using Machine Learning Techniques

Abstract: Distributing numerous services over the internet is called Cloud Computing. Applications and tools like networking, data storage, databases, servers, software are examples of the resources. The service provider is required to provide the resource always and from any location. However, the network is the most important factor in gaining access to data in the cloud. When leveraging the cloud network, the cloud threats take advantage. An intrusion Detection System (IDS) observes the network and detects and report… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Both these model plays a substantial role in the IoT environment, and the analysis is done with MATLAB simulation environment. The outcomes of the approach are compared with various existing methods like Linear Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), k-Nearest Neighbour (k-NN), and Artificial Neural Networks (ANN), respectively [32][33][34][35].…”
Section: Methodsmentioning
confidence: 99%
“…Both these model plays a substantial role in the IoT environment, and the analysis is done with MATLAB simulation environment. The outcomes of the approach are compared with various existing methods like Linear Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), k-Nearest Neighbour (k-NN), and Artificial Neural Networks (ANN), respectively [32][33][34][35].…”
Section: Methodsmentioning
confidence: 99%
“…This model is naturally asymmetric as output layers' weight is not required during the encoding process but prevails during the decoding process. The unnecessary mapping can eliminate the necessity of low-dimensionality features [29][30][31][32]. The anticipated model can remove the learning system naturally.…”
Section: Consider the Training Samplesmentioning
confidence: 99%
“…the vector x was specified in (27) and after that, the bounded constant c is provided as in (28). This demonstrates that output of the sensor nodes may be approximated as the RNN with input of m prior output sample from the similar nodes, as well as present and m prior output samples from surrounding sensor.…”
Section: Recurrent Neural Networkmentioning
confidence: 99%