共 50 条
RETRACTED: Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm (Retracted Article)
被引:8
|作者:
Kshirsagar, Pravin R.
[1
]
Manoharan, Hariprasath
[2
]
Alterazi, Hassan A.
[3
]
Alhebaishi, Nawaf
[4
]
Rabie, Osama Bassam J.
[4
]
Shitharth, S.
[5
]
机构:
[1] GH Raisoni Coll Engn, Dept Artificial Intelligence, Nagpur, India
[2] Panimalar Engn Coll, Dept Elect & Commun Engn, Chennai, India
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah, Saudi Arabia
[4] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
[5] Kebri Dehar Univ, Dept Comp Sci & Engn, Kebri Dehar, Ethiopia
关键词:
D O I:
10.1155/2022/9386989
中图分类号:
TM [电工技术];
TN [电子技术、通信技术];
学科分类号:
0808 ;
0809 ;
摘要:
Cloud services are a popular concept used to describe how internet-based services are delivered and maintained. The computer technology environment is being restructured with respect to information preservation. Data protection is of critical importance when storing huge volumes of information. In today's cyber world, an intrusion is a significant security problem. Services, information, and services are all vulnerable to attack in the cloud due to its distributed structure of the cloud. Inappropriate behavior in the connection and in the host is detected using intrusion detection systems (IDS) in the cloud. DDoS attacks are difficult to protect against since they produce massive volumes of harmful information on the network. This assault forces the cloud services to become unavailable to target consumers, which depletes computer resources and leaves the provider exposed to massive financial and reputational losses. Cyber-analyst data mining techniques may assist in intrusion detection. Machine learning techniques are used to create many strategies. Attribute selection techniques are also vital in keeping the dataset's dimensionality low. In this study, one method is provided, and the dataset is taken from the NSL-KDD dataset. In the first strategy, a filtering method called learning vector quantization (LVQ) is used, and in the second strategy, a dimensionality-simplifying method called PCA. The selected attributes from each technique are used for categorization before being tested against a DoS attack. This recent study shows that an LVQ-based SVM performs better than the competition in detecting threats.
引用
收藏
页数:13
相关论文