Due to speedy development in internet facilities, detecting intrusions in a real-time cloud environment is challenging via traditional methods. In this case, advanced machine or deep learning methods can be efficiently used in anomaly or intrusion detection. Thus, the present study focuses on designing and developing the intrusion detection scheme using an ensemble learning-based random forest method and deep convolutional neural networks in a near real-time cloud atmosphere. The proposed models were tested on CSE-CICIDS2018 datasets in Python (Anaconda 3) environment. The proposed models achieved 97.73 and 99.91 per cent accuracy using random forest and deep convolutional neural networks, respectively. The developed models can be effective...
Abstract: In all technologies, including traditional computing and cloud computing, security has alw...
Intrusion Detection Systems (IDSs) play a key role in modern ICT security. Attacks detected and repo...
Cloud computing is currently a thriving technology. Due to their critical nature, it is necessary to...
The world of the Internet and networking is exposed to many cyber-attacks and threats. Over the year...
Intrusion Detection (ID) for network security prevents and detects malicious behaviours or unauthori...
In recent years data mining has acquired huge popularity in the field of knowledge discovery. Thus, ...
In recent years data mining has acquired huge popularity in the field of knowledge discovery. Thus, ...
The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vuln...
In today’s world, businesses and services are shifted to a digital transformation. As a result, netw...
With the growing rate of cyber-attacks , there is a significant need for intrusion detection system...
Nowadays the network security is a crucial issue and traditional intrusion detection systems are not...
The connectivity of our surrounding objects to the internet plays a tremendous role in our daily liv...
A model of an intrusion-detection system capable of detecting attack in computer networks is describ...
The increased adoption of cloud computing resources produces major loopholes in cloud computing for ...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
Abstract: In all technologies, including traditional computing and cloud computing, security has alw...
Intrusion Detection Systems (IDSs) play a key role in modern ICT security. Attacks detected and repo...
Cloud computing is currently a thriving technology. Due to their critical nature, it is necessary to...
The world of the Internet and networking is exposed to many cyber-attacks and threats. Over the year...
Intrusion Detection (ID) for network security prevents and detects malicious behaviours or unauthori...
In recent years data mining has acquired huge popularity in the field of knowledge discovery. Thus, ...
In recent years data mining has acquired huge popularity in the field of knowledge discovery. Thus, ...
The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vuln...
In today’s world, businesses and services are shifted to a digital transformation. As a result, netw...
With the growing rate of cyber-attacks , there is a significant need for intrusion detection system...
Nowadays the network security is a crucial issue and traditional intrusion detection systems are not...
The connectivity of our surrounding objects to the internet plays a tremendous role in our daily liv...
A model of an intrusion-detection system capable of detecting attack in computer networks is describ...
The increased adoption of cloud computing resources produces major loopholes in cloud computing for ...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
Abstract: In all technologies, including traditional computing and cloud computing, security has alw...
Intrusion Detection Systems (IDSs) play a key role in modern ICT security. Attacks detected and repo...
Cloud computing is currently a thriving technology. Due to their critical nature, it is necessary to...