{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:07:12Z","timestamp":1775070432240,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-04884-8","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T14:02:34Z","timestamp":1740492154000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cloud security modeling: using TCP deltas with data analytics and machine learning techniques"],"prefix":"10.1007","volume":"28","author":[{"given":"Mohamed Fazil","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Salwa Sayeedul","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Hasan","family":"Rauf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"4884_CR1","doi-asserted-by":"crossref","unstructured":"Athamnah, M., Hussain, M.\u00a0F. & Hasan, S.\u00a0S. Impact of running dynamic\/static scans on the performance of an app running in a gke clusters (2021)","DOI":"10.1109\/IDSTA53674.2021.9660814"},{"key":"4884_CR2","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Futur. Gener. Comput. Syst. 78, 680\u201398 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4884_CR3","doi-asserted-by":"crossref","unstructured":"Hussain, M.\u00a0F., Athamnah, M., Hasan, S.\u00a0S. & Rauf, H. Analyzing application response time lag: in mobile edge and fog computing environments (2023)","DOI":"10.1109\/FMEC59375.2023.10306235"},{"key":"4884_CR4","unstructured":"Bloomberg. Unitedhealthcare ransomware attack. Bloomberg News on MGM Restor Ransomware Attack (2024). https:\/\/www.bloomberg.com\/news\/articles\/2023-09-16\/mgm-resorts-hackers-broke-in-after-tricking-it-service-desk?sref=qYiz2hd0\/"},{"key":"4884_CR5","unstructured":"CNN. Mgm ransomware attack. CNN MGM Ransomware Attack (2021). https:\/\/www.cnn.com\/2023\/10\/05\/business\/mgm-100-million-hit-data-breach\/index.html\/"},{"key":"4884_CR6","doi-asserted-by":"crossref","unstructured":"Khan, I.\u00a0A. et\u00a0al. A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks. Applied Intelligence 1\u201316 (2021)","DOI":"10.1007\/s10489-021-02222-8"},{"key":"4884_CR7","doi-asserted-by":"publisher","first-page":"102930","DOI":"10.1016\/j.adhoc.2022.102930","volume":"134","author":"IA Khan","year":"2022","unstructured":"Khan, I.A., Keshk, M., Pi, D., Khan, N., Hussain, Y., Soliman, H.: Enhancing IIoT networks protection: a robust security model for attack detection in internet industrial control systems. Ad. Hoc. Netw. 134, 102930 (2022)","journal-title":"Ad. Hoc. Netw."},{"key":"4884_CR8","doi-asserted-by":"publisher","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","volume":"9","author":"IA Khan","year":"2021","unstructured":"Khan, I.A., et al.: A new explainable deep learning framework for cyber threat discovery in industrial iot networks. IEEE Internet Things J. 9, 11604\u201311613 (2021)","journal-title":"IEEE Internet Things J."},{"key":"4884_CR9","unstructured":"Owasp application security verification standard. https:\/\/owasp.org\/www-project-application-security-verification-standard\/"},{"key":"4884_CR10","doi-asserted-by":"crossref","unstructured":"Tomar, A., Jeena, D., Mishra, P.: & Bisht, R. A threat model, attack taxonomy and real-time attack scenario of dos, Docker security (2020)","DOI":"10.1109\/Confluence47617.2020.9058115"},{"key":"4884_CR11","doi-asserted-by":"crossref","unstructured":"Marden, J.\u00a0I. Positions and qq plots. Statistical Science 606\u2013614 (2004)","DOI":"10.1214\/088342304000000512"},{"key":"4884_CR12","volume-title":"Kolmogorov-smirnov test: overview","author":"VW Berger","year":"2014","unstructured":"Berger, V.W., Zhou, Y.: Kolmogorov-smirnov test: overview. Statistics reference online, Wiley statsref (2014)"},{"key":"4884_CR13","unstructured":"Gulati, H., Singh, P. et\u00a0al. Clustering techniques in data mining: A comparison (2015)"},{"key":"4884_CR14","unstructured":"Lin, K., Li, X., Zhang, Z. & Chen, J. A k-means clustering with optimized initial center based on hadoop platform (2014)"},{"key":"4884_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.05.002","volume":"141","author":"A Arfeen","year":"2019","unstructured":"Arfeen, A., Pawlikowski, K., McNickle, D., Willig, A.: The role of the weibull distribution in modelling traffic in internet access and backbone core networks. J. Net. Comput. Appl. 141, 1\u201322 (2019)","journal-title":"J. Net. Comput. Appl."},{"key":"4884_CR16","unstructured":"Yousif, S. & Al-Dulaimy, A. Clustering cloud workload traces to improve the performance of cloud data centers (2017)"},{"issue":"2","key":"4884_CR17","first-page":"15","volume":"7","author":"N Boyko","year":"2018","unstructured":"Boyko, N., Mykhailyshyn, P., Kryvenchuk, Y.: Use a cluster approach to organize and analyze data inside the cloud. ECONTECHMOD: Int. Quarterly\u00a0J. Econ. Technol. Model. Process. 7(2), 15\u201322 (2018)","journal-title":"ECONTECHMOD: Int. Quarterly\u00a0J. Econ. Technol. Model. Process."},{"key":"4884_CR18","doi-asserted-by":"crossref","unstructured":"Arora, S. & Chana, I. A survey of clustering techniques for big data analysis (2014)","DOI":"10.1109\/CONFLUENCE.2014.6949256"},{"issue":"3","key":"4884_CR19","first-page":"4119","volume":"3","author":"N Singh","year":"2012","unstructured":"Singh, N., Singh, D.: Performance evaluation of k-means and heirarichal clustering in terms of accuracy and running time. (JCSIT): Int. J. Comput. Sci. Inform. Technol. 3(3), 4119\u201321 (2012)","journal-title":"(JCSIT): Int. J. Comput. Sci. Inform. Technol."},{"key":"4884_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., Li, W. & Li, Y. Network traffic classification using k-means clustering (2007)","DOI":"10.1109\/IMSCCS.2007.4392626"},{"key":"4884_CR21","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s00607-018-0619-4","volume":"101","author":"J Kim","year":"2019","unstructured":"Kim, J., Sim, A., Tierney, B., Suh, S., Kim, I.: Multivariate network traffic analysis using clustered patterns. Computing 101, 339\u2013361 (2019)","journal-title":"Computing"},{"key":"4884_CR22","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s11761-019-00270-0","volume":"13","author":"E Subramanian","year":"2019","unstructured":"Subramanian, E., Tamilselvan, L.: A focus on future cloud: machine learning-based cloud security. Serv. Orient. Comput. Appl. 13, 237\u2013249 (2019)","journal-title":"Serv. Orient. Comput. Appl."},{"key":"4884_CR23","doi-asserted-by":"crossref","unstructured":"Hossen, M.\u00a0S., Ahmad, T. & Putra, M. A.\u00a0R. Traffic classification with machine learning for enhancing cloud security (2023)","DOI":"10.1109\/IMSA58542.2023.10217598"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04884-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04884-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04884-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:34:49Z","timestamp":1757140489000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04884-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,25]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4884"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04884-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,25]]},"assertion":[{"value":"11 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"260"}}