10
Views
0
CrossRef citations to date
0
Altmetric
Research Article

EfficientNet-deep quantum neural network-based economic denial of sustainability attack detection to enhance network security in cloud

, , &
Received 19 Oct 2023, Accepted 23 May 2024, Published online: 21 Jun 2024

References

  • Abbasi H, Ezzati-Jivan N, Bellaiche M, Talhi C, Dagenais MR. 2019. Machine learning-based EDoS attack detection technique using execution trace analysis. J Hardw Syst Secur. 3(2):164–176. doi: 10.1007/s41635-018-0061-2.
  • Agrawal N, Tapaswi S. 2020. A proactive defense method for the stealthy EDoS attacks in a cloud environment. Int J Network Manage. 30(2):e2094. doi: 10.1002/nem.2094.
  • Aldhyani TH, Alkahtani H. 2022. Artificial intelligence algorithm-based economic denial of sustainability attack detection systems: Cloud computing environments. Sensors. 22(13):4685. doi: 10.3390/s22134685.
  • Alhichri H, Alswayed AS, Bazi Y, Ammour N, Alajlan NA. 2021. Classification of remote sensing images using EfficientNet-B3 CNN model with attention. IEEE Access. 9:14078–14094. doi: 10.1109/ACCESS.2021.3051085.
  • Beer K, Bondarenko D, Farrelly T, Osborne TJ, Salzmann R, Scheiermann D, Wolf R. 2020. Training deep quantum neural networks. Nat Commun. 11(1):808. doi: 10.1038/s41467-020-14454-2.
  • Bhaladhare PR, Jinwala DC. 2014. A clustering approach for the l -diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm. Adv Comput Eng. 2014:1–12. doi: 10.1155/2014/396529.
  • BoT-IoT dataset is taken from. [accessed on Sep 2023]. https://ieee-dataport.org/documents/bot-iot-dataset.
  • Cha SH. 2007. Comprehensive survey on distance/similarity measures between probability density functions. City. 1(2):1.
  • Chowdhury FZ, Kiah LBM, Ahsan MM, Myib I. 2017. Economic denial of sustainability (EDoS) mitigation approaches in cloud: Analysis and open challenges. In Proceedings of 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), Palembang, Indonesia, IEEE. p. 206–211.
  • Cil AE, Yildiz K, Buldu A. 2021. Detection of DDoS attacks with feed forward based deep neural network model. Expert Syst Appl. 169:114520. doi: 10.1016/j.eswa.2020.114520.
  • Dennis JB, Priya MS. 2021. A profile-based novel framework for detecting EDoS attacks in the cloud environment. Wirel Pers Commun. 117(4):3487–3503. doi: 10.1007/s11277-021-08280-y.
  • Ghanem K, Aparicio-Navarro FJ, Kyriakopoulos KG, Lambotharan S, Chambers JA. 2017. Support vector machine for network intrusion and cyber-attack detection. In Proceedings of 2017 sensor signal processing for defence conference (SSPD), London, UK p. 1–5.
  • Janaiah B. 2022. Attack detection in IoT using DBN based optimization algorithm. J Netw Commun Syst. 5(1):40–49. doi: 10.46253/jnacs.v5i1.a5.
  • Kafhali SE, Mir IE, Hanini M. 2022. Security threats, defense mechanisms, challenges, and future directions in cloud computing. Arch Comput Methods Eng. 29(1):223–246. doi: 10.1007/s11831-021-09573-y.
  • Karthika A, Muthukumaran N. 2022. An ADS-PAYG approach using trust factor Against economic denial of sustainability attacks in cloud storage. Wirel Pers Commun. 122(1):69–85. doi: 10.1007/s11277-021-08889-z.
  • Khordadpour P, Ahmadi S. 2023. FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing. arXiv preprint arXiv:2305.16389.
  • Ling Z, Hao ZJ. 2022a. An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system. Int J Semant Web Inf Syst. 18(1):1–25. doi: 10.4018/IJSWIS.308469.
  • Ling Z, Hao ZJ. 2022b. Intrusion detection using normalized mutual information feature selection and parallel quantum genetic algorithm. Int J Semant Web Inf Syst. 18(1):1–24. doi: 10.4018/IJSWIS.307324.
  • Maithem M, Al-Sultany GA. 2021. Network intrusion detection system using deep neural networks. Proc J Phys Conf Ser IOP Publ. 1804(1):012138. doi: 10.1088/1742-6596/1804/1/012138.
  • Nhu CN, Park M. 2021. Two-phase deep learning-based EDoS detection system. Appl Sci. 11(21):10249. doi: 10.3390/app112110249.
  • NSL-KDD dataset is taken from. [accessed on Sep 2023]. https://www.unb.ca/cic/datasets/nsl.html.
  • Prasad AVK. 2021. Deep learning based optimization for detection of attacks in IoT. J Netw Commun Syst. 4(2):31–36. doi: 10.46253/jnacs.v4i2.a5.
  • Prihanditya HA. 2020. The implementation of z-score normalization and boosting techniques to increase accuracy of c4.5 algorithm in diagnosing chronic kidney disease. J Soft Comput Exploration. 1(1):63–69.
  • Sabahi F. 2011. Cloud computing security threats and responses. In Proceedings of 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi’an, China, IEEE. p. 245–249.
  • Soe YN, Santosa PI, Hartanto R. 2019. DDos attack detection based on simple ann with smote for iot environment. In Proceedings of 2019 fourth international conference on informatics and computing (ICIC), Semarang, Indonesia, IEEE. p. 1–5.
  • Ta VQ, Park M. 2021. MAN-EDoS: a multihead attention network for the detection of economic denial of sustainability attacks. Electronics. 10(20):2500. doi: 10.3390/electronics10202500.
  • Zhou S, Chen B, Zhang Y, Liu H, Xiao Y, Pan X. 2020. A feature extraction method based on feature fusion and its application in the text-driven failure diagnosis field. Int J Interact Multimedia Artif Intell. 6(4):121. doi: 10.9781/ijimai.2020.11.006.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.