Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor.
Sasha Mahdavi HezavehiRouhollah RahmaniPublished in: J. Parallel Distributed Comput. (2023)
Keyphrases
- detection method
- third party
- computing environments
- ddos attacks
- network services
- computing platform
- face detection
- detection algorithm
- mobile agents
- dos attacks
- denial of service attacks
- anomaly detection
- cloud computing
- mobile computing
- personal information
- reverse logistics
- sensitive information
- virtual machine
- intrusion detection
- computational intelligence