Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN).
E. BalamuruganAbolfazl MehbodniyaElham KaririKusum YadavAnil KumarMohd Anul HaqPublished in: Pattern Recognit. Lett. (2022)
Keyphrases
- cloud computing
- intrusion detection system
- network access
- intrusion detection
- network security
- intrusion prevention
- security measures
- network traffic
- computer networks
- cloud computing environment
- security issues
- cyber attacks
- network attacks
- cyber security
- computer security
- countermeasures
- computing resources
- cloud storage
- distributed intrusion detection
- information security
- data center
- anomaly detection
- security policies
- cloud computing platform
- computing platform
- data management
- network intrusion detection
- service providers
- dos attacks
- network management
- normal behavior
- security mechanisms
- cloud services
- unauthorized access
- computer systems
- attack scenarios
- computing infrastructure
- virtual machine
- wireless networks
- access control
- data mining techniques
- data sets
- data mining
- databases
- information systems
- trusted computing
- load balance
- critical infrastructure
- security requirements