A Deep Reinforcement Learning-based DDoS Attack Mitigation Scheme for Securing Big Data in Fog-Assisted Cloud Environment
Author:
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Link
https://link.springer.com/content/pdf/10.1007/s11277-023-10407-2.pdf
Reference34 articles.
1. Bawany, N. Z., Shamsi, J. A., & Salah, K. (2017). DDoS attack detection and mitigation using SDN: Methods, practices, and solutions. Arabian Journal for Science and Engineering, 42(2), 425–441.
2. Berral, J. L., Poggi, N., Alonso, J., Gavaldà, R., Torres, J., & Parashar, M. (2008). Adaptive distributed mechanism against flooding network attacks based on machine learning. In Proceedings of 1st ACM workshop on Workshop on AISec - AISec '08, 1(1), (pp. 67–74).
3. Cui, J., He, J., Xu, Y., & Zhong, H. (2018). TDDAD: Time-based detection and defense scheme against DDoS attack on SDN controller. Information Security and Privacy, 1(1), 649–665.
4. Elhassouny, A., & Smarandache, F. (2019). Trends in deep convolutional neural networks architectures: A review. In International conference of computer science and renewable energies (ICCSRE), 1(1),(pp. 87–96)
5. Sengathir J., Deva Priya M. (2021). Improved Artificial Bee Colony using Monarchy Butterfly Optimization Algorithm for Load Balancing (IABC-MBOA-LB) in Cloud Environment, Journal of Networks and Systems Management (Vol. 29, No. 39) Springer. ISSN: 1573-7705.
Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Parallel path selection mechanism for DDoS attack detection;Journal of Network and Computer Applications;2024-10
2. Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art approaches;Egyptian Informatics Journal;2024-09
3. Hybrid Prairie Dog and Beluga Whale optimization algorithm for multi-objective load balanced-task scheduling in cloud computing environments;China Communications;2024-07
4. Lightweight Deep Learning Method based on Group Convolution: Detecting DDoS Attacks in IoT Environments;2024 10th International Symposium on System Security, Safety, and Reliability (ISSSR);2024-03-16
5. Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment;Expert Systems with Applications;2024-03
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3