2022
DOI: 10.1002/ett.4561
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN‐RFOA

Abstract: Cloud computing (CC) is vulnerable for the attacks of current information technology, because it prolongs and uses the information technology infrastructure, traditional operating system, and applications. Several security issues in detecting irregular network performances are confronted by the CC environment. With the intention of solving these security issues, dual-channel capsule generation adversarial network optimized with red fox optimization algorithm fostered intrusion detection framework (IDS-CC-DCCGA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 39 publications
0
7
0
Order By: Relevance
“…The performance metrics studied to examine efficacy of proposed method. Then efficiency of BAD‐DCCGAN‐AGNN‐SCRN is evaluated to the existing BAD‐AESA‐SCRN, 18 BAD‐BMHHO‐ENN‐SCRN, 19 BAD‐HCM‐EELM‐SCRN models, 20 DCCGAN‐RFOA 28 …”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The performance metrics studied to examine efficacy of proposed method. Then efficiency of BAD‐DCCGAN‐AGNN‐SCRN is evaluated to the existing BAD‐AESA‐SCRN, 18 BAD‐BMHHO‐ENN‐SCRN, 19 BAD‐HCM‐EELM‐SCRN models, 20 DCCGAN‐RFOA 28 …”
Section: Resultsmentioning
confidence: 99%
“…Then efficiency of BAD-DCCGAN-AGNN-SCRN is evaluated to the existing BAD-AESA-SCRN, 18 BAD-BMHHO-ENN-SCRN, 19 BAD-HCM-EELM-SCRN models, 20 DCCGAN-RFOA. 28…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…6 The block chain is a distributed database that focuses on trust and security issues. 7 It is maintained by several nodes. 8 The block chain depends upon four technological features to provide trustworthy secure services: (1) Distributed ledger maintains a record of all block chain transactions.…”
Section: Introductionmentioning
confidence: 99%
“…There have been a number of researches on BC technology and routing approaches in recent years 6 . The block chain is a distributed database that focuses on trust and security issues 7 . It is maintained by several nodes 8 .…”
Section: Introductionmentioning
confidence: 99%