- [1] Alduailij, Q. W. Khan, M. Tahir, M. Sardaraz, M. Alduailij, and F. Malik, “Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method,” Symmetry 2022, vol. 14, no. 6, pp. 1095, May 2022, doi: 10.3390/SYM14061095.
- [2] Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Comput. Electr. Eng., vol. 71, pp. 28–42, Oct. 2018, doi: 10.1016/J.COMPELECENG.2018.06.006.
- [3] Gurav and R. Shaikh, “Virtualization: A key feature of cloud computing,” ICWET 2010 - Int. Conf. Work. Emerg. Trends Technol. 2010, Conf. Proc., no. July 2020, pp. 227–229, 2010, doi: 10.1145/1741906.1741957.
- [4] Mishra, S. K. Sharma, and M. A. Alowaidi, “Analysis of security issues of cloud-based web applications,” J. Ambient Intell. Humaniz. Comput., no. 0123456789, 2020, doi: 10.1007/s12652-020-02370-8.
- [5] A. Khan, “A survey of security issues for cloud computing,” J. Netw. Comput. Appl., vol. 71, pp. 11–29, 2016, doi: 10.1016/j.jnca.2016.05.010.
- [6] Karthikeyan and G. Usha, “Real-time DDoS flooding attack detection in intelligent transportation systems,” Comput. Electr. Eng., vol. 101, p. 107995, Jul. 2022, doi: 10.1016/J.COMPELECENG.2022.107995.
- [7] Prabadevi and N. Jeyanthi, “Distributed denial of service attacks and its effects on cloud environment- A survey,” 2014 Int. Symp. Networks, Comput. Commun. ISNCC 2014, 2014, doi: 10.1109/SNCC.2014.6866508.
- [8] Mittal, K. Kumar, and S. Behal, “deep learning approaches for detecting DDoS attacks: a systematic review,” Soft Comput., pp. 1–37, Jan. 2022, doi: 10.1007/S00500-021-06608
- [9] Mallampati, S. B., & Seetha, H, “A Review on Recent Approaches of Machine Learning, Deep Learning, and Explainable Artificial Intelligence in Intrusion Detection Systems,” Majlesi Journal of Electrical Engineering, vol. 17, no. 1, pp. 29-54, 2023.
- [10] Ahmad, A. S. Khan, C. W. Shiang, J. Abdullah, and F. Ahmad, “Network intrusion detection system: A systematic study of machine learning and deep learning approaches,” Trans Emerg. Tel Tech, vol. 32, 2021, doi: 10.1002/ett.4150.
- [11] Alghazzawi, O. Bamasaq, H. Ullah, and M. Z. Asghar, “Efficient Detection of DDoS Attacks Using a Hybrid deep learning Model with Improved Feature Selection,” Appl. Sci. 2021, Vol. 11, Page 11634, vol. 11, no. 24, p. 11634, Dec. 2021, doi: 10.3390/APP112411634, 2021.
- [12] Dehkordi, A. B., Soltanaghaei, M., & Boroujeni, F. Z, “A Hybrid Mechanism to Detect DDoS Attacks in Software Defined Networks,” Majlesi Journal of Electrical Engineering, vol. 15, no. 1, 2021.
- [13] Jaw, E., & Wang, X, “Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach,” Symmetry, vol. 13, no. 10, pp. 1764, 2021.
- [14] Mahdi, M. M., Mohammed, M. A., Al-Chalibi, H., Bashar, B. S., Sadeq, H. A., & Abbas, T. M. J, “An Ensemble Learning Approach for Glaucoma Detection in Retinal Image,” Majlesi Journal of Electrical Engineering, vol. 16, no. 4, pp. 117-122, 2022.
- [15] Bahmani, A., & Monajemi, A, “Introducing a Two-step Strategy Based on Deep Learning to Enhance the Accuracy of Intrusion Detection Systems in the Network,” Majlesi Journal of Telecommunication Devices, vol. 8, no. 1, pp. 21-25, 2019.
- [16] Filonov, P., Kitashov, F., & Lavrentyev, A,”Rnn-based early cyber-attack detection for the tennessee eastman process,” arXiv preprint arXiv:1709.02232, 2017.
- [17] Aamir, S.M.A. Zaidi, “DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation,” Int. J. Inf. Secur, vol. 18, pp. 761–785, https://doi.org/10.1007/s10207-019-00434-1, 2019
- [18] Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martínez-del-Rincón and D. Siracusa, "Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection," in IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 876-889, June 2020, doi: 10.1109/TNSM.2020.2971776.
- [19] Moubayed, A., Aqeeli, E., & Shami, A, “Ensemble-based feature selection and classification model for DNS typo-squatting detection,” In 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (pp. 1-6). IEEE.
- [20] Agarwal, A., Khari, M., & Singh, R, “Detection of DDOS attack using deep learning model in cloud storage application,” Wireless Personal Communications, pp. 1-21, 2021.
- [21] Alghazzawi, D., Bamasag, O., Ullah, H., & Asghar, M. Z, “Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection,” Applied Sciences, vo. 11, no. 24, pp. 11634, 2021
- [22] Abbas, A., Khan, M. A., Latif, S., Ajaz, M., Shah, A. A., & Ahmad, J, “A new ensemble-based intrusion detection system for internet of things,” Arabian Journal for Science and Engineering, pp. 1-15, 2021.
- [23] Krishnaveni, S., Sivamohan, S., Sridhar, S. S., & Prabakaran, S, “Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing,” Cluster Computing, vol. 24, no. 3, pp. 1761-1779, 2021.
- [24] Saha, S., Priyoti, A. T., Sharma, A., & Haque, A, “Towards an Optimized Ensemble Feature Selection for DDoS Detection Using Both Supervised and Unsupervised Method,” Sensors, 22(23), 9144, 2022.
- [25] Priyadarshini, R., & Barik, R. K, “A deep learning based intelligent framework to mitigate DDoS attack in fog environment,” Journal of King Saud University-Computer and Information Sciences, 34(3), 825-831, 2022.
- [26] Jiang, J., Liu, F., Ng, W. W., Tang, Q., Zhong, G., Tang, X., & Wang, B, “AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing,” Computer Communications, 2023.
- [27] Bouke, M. A., Abdullah, A., ALshatebi, S. H., Abdullah, M. T., & El Atigh, H, “An intelligent DDoS attack detection tree-based model using Gini index feature selection method,” Microprocessors and Microsystems, vol. 98, pp. 104823, 2023
- [28] Abosuliman, S. S, “Deep learning techniques for securing cyber-physical systems in supply chain 4.0,” Computers and Electrical Engineering, vol. 107, pp. 108637, 2023.
- [29] Balamurugan, V., & Saravanan, R, “Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation,” Cluster Computing, vol. 22, no. 6, pp. 13027-13039, 2019.
- [30] Ortet Lopes, D. Zou, F. A. Ruambo, S. Akbar, and B. Yuan, “Towards Effective Detection of Recent DDoS Attacks: A deep learning Approach,” Secur. Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/5710028
- [31] Haider, S., Akhunzada, A., Mustafa, I., Patel, T. B., Fernandez, A., Choo, K. K. R., & Iqbal, J. (2020), “ A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks,” Ieee Access, vol. 8, pp. 53972-53983.
- [32] Naveen Bindra and Manu Sood, “Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset,” Control Comput. Sci., vol. 53, no. 5, pp. 419–428, Sep. 2019, doi: 10.3103/S0146411619050043/TABLES/3.
- [33] Yousuf and R. N. Mir, “DDoS attack detection in Internet of Things using recurrent neural network,” Comput. Electr. Eng., vol. 101, no. May, p. 108034, 2022, doi: 10.1016/j.compeleceng.2022.108034.
- [34] Chiba, N. Abghour, K. Moussaid, A. El, and M. Rida, “Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms Network intrusion detection system Deep Neural Network Genetic algorithm Simulated Annealing Algorithm,” Comput. Secur., vol. 86, pp. 291–317, 2019, doi: 10.1016/j.cose.2019.06.013.
- [35] V Alghazzawi, D., Bamasag, O., Ullah, H., & Asghar, M. Z, “Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection,” Applied Sciences, vol. 11, no. 24, pp. 11634, 2021
- [36] Sadaf and J. Sultana, "Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing," in IEEE Access, vol. 8, pp. 167059-167068, 2020, doi: 10.1109/ACCESS.2020.3022855.
- [37] Bhardwaj, A., Mangat, V., & Vig, R, “Hyperband tuned deep neural network with well posed stacked sparse autoencoder for detection of DDoS attacks in cloud,” IEEE Access, vol. 8, pp. 181916-181929, 2020.
- [38] Al-Fawa'reh, M., Al-Fayoumi, M., Nashwan, S., & Fraihat, S, “Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior,” Egyptian Informatics Journal, vol. 23, no. 2, pp. 173-185, 2022.
- [39] Kadhim, Q. K., Al-Sudani, A. S., Almani, I. A., Alghazali, T., Dabis, H. K., Mohammed, A. T., ... & Mezaal, Y, “IOT-MDEDTL: IoT Malware Detection based on Ensemble Deep Transfer Learning,” Majlesi Journal of Electrical Engineering, vol. 16, no. 3, pp. 47-54, 2022.
- [40] Wang, M., Lu, Y., & Qin, J, “A dynamic MLP-based DDoS attack detection method using feature selection and feedback,” Computers & Security, vol. 88, pp. 101645.
- [41] Jain, R., & Bhatt, C, “PRP-Based Cascaded Feed-Forward Network for Detection and Prevention of DDoS Cyber Attacks,” International Journal of Innovative Research in Technology and Management, Vol. 6, no. 2, pp. 131-140, 2022.
|