{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:41:46Z","timestamp":1767008506839},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11761-019-00270-0","type":"journal-article","created":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T17:03:51Z","timestamp":1565629431000},"page":"237-249","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["A focus on future cloud: machine learning-based cloud security"],"prefix":"10.1007","volume":"13","author":[{"given":"E. K.","family":"Subramanian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Latha","family":"Tamilselvan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"270_CR1","unstructured":"https:\/\/www.analyticsvidhya.com\/blog\/2018\/07\/using-power-deep-learning-cyber-security\/"},{"issue":"10","key":"270_CR2","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"C Tsai","year":"2009","unstructured":"Tsai C, Hsu Y, Lin C, Lin W (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994\u201312000","journal-title":"Expert Syst Appl"},{"issue":"2","key":"270_CR3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"D Fernandes","year":"2014","unstructured":"Fernandes D, Soares L, Gomes J, Freire M, In\u00e1cio P (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113\u2013170","journal-title":"Int J Inf Secur"},{"key":"270_CR4","doi-asserted-by":"crossref","unstructured":"Kandukuri B, Paturi V, Rakshit A (2009) Cloud security issues. In: IEEE international conference on services computing, pp 517\u2013520","DOI":"10.1109\/SCC.2009.84"},{"key":"270_CR5","unstructured":"Almulla S, Yeun C (2010) Cloud computing security management. In: 2nd international conference on ICESMA. IEEE, pp 1\u20137"},{"key":"270_CR6","unstructured":"Palivela H, Chawande N, Wani A (2011) Development of server in cloud computing to solve issues related to security and backup. In: IEEE CCIS, pp 158\u2013163"},{"key":"270_CR7","unstructured":"Roshke S, Cheng F, Meinel C (2009) Intrusion detection in the cloud. In: Eighth IEEE international conference on dependable, autonomic and secure computing, pp 729\u2013734"},{"key":"270_CR8","doi-asserted-by":"crossref","unstructured":"Laura A, Moro R (2008) Support vector machines (SVM) as a technique for solvency analysis. DIW Berlin discussion paper","DOI":"10.2139\/ssrn.1424949"},{"issue":"7","key":"270_CR9","first-page":"3352","volume":"11","author":"X Zhang","year":"2013","unstructured":"Zhang X, Zhao Y (2013) Application of support vector machine to reliability analysis of engine systems. Telkomnika 11(7):3352\u20133560","journal-title":"Telkomnika"},{"key":"270_CR10","volume-title":"Neural networks: a comprehensive foundation","author":"S Haykin","year":"2009","unstructured":"Haykin S (2009) Neural networks: a comprehensive foundation, 2nd edn. Prentice Hall, Englewood Cliffs, NJ","edition":"2"},{"key":"270_CR11","volume-title":"Machine learning: an artificial intelligence approach","author":"R Michalski","year":"2013","unstructured":"Michalski R, Carbonell J, Mitchell T (2013) Machine learning: an artificial intelligence approach. Springer, Berlin"},{"key":"270_CR12","volume-title":"Classification and regressing trees","author":"L Breiman","year":"1984","unstructured":"Breiman L, Friedman J, Olshen R, Stone P (1984) Classification and regressing trees. Wadsworth International Group, Belmont, CA"},{"key":"270_CR13","doi-asserted-by":"crossref","unstructured":"Stein G, Chen B, Wu A, Hua K (2005) Decision tree classifier for network intrusion detection with GA-based feature selection. In: Paper presented at the proceedings of the 43rd annual southeast regional conference, Kennesaw, GA","DOI":"10.1145\/1167253.1167288"},{"key":"270_CR14","doi-asserted-by":"crossref","unstructured":"Bhamare D, Salman T, Samaka M, Erbad A, Jain R (2016) Feasibility of supervised machine learning for cloud security. In: 2016 international conference on information science and security (ICISS), Pattaya, pp 1\u20135","DOI":"10.1109\/ICISSEC.2016.7885853"},{"key":"270_CR15","unstructured":"Ayodele T, Adeegbe D (2013) Cloud based emails boundaries and vulnerabilities. In: 2013 science and information conference, London, pp 912\u2013914"},{"issue":"5","key":"270_CR16","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/TPDS.2018.2876844","volume":"30","author":"RR Karn","year":"2019","unstructured":"Karn RR, Kudva P, Elfadel IA (2019) Dynamic autoselection and autotuning of machine learning models for cloud network analytics. IEEE Trans Parallel Distrib Syst 30(5):1052\u20131064","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"270_CR17","unstructured":"https:\/\/www.ixiacom.com\/products\/professional-services\/test-as-a-service-taas"},{"key":"270_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4163","author":"T Hong","year":"2017","unstructured":"Hong T, Choi C, Shin J (2017) CNN-based malicious user detection in social networks. Concurr Comput. \n                    https:\/\/doi.org\/10.1002\/cpe.4163","journal-title":"Concurr Comput"},{"key":"270_CR19","doi-asserted-by":"crossref","unstructured":"Kuo W-C, Lin Y-P, Chang C-Y, Lin C-C, Lin H-H (2019) Malware detection method based on CNN. In: New trends in computer technologies and applications","DOI":"10.1007\/978-981-13-9190-3_67"},{"key":"270_CR20","doi-asserted-by":"publisher","unstructured":"Habibi Lashkari A, Draper Gil G, Mamun M, Ghorbani A (2017) Characterization of Tor traffic using time based features, pp 253\u2013262. \n                    https:\/\/doi.org\/10.5220\/0006105602530262","DOI":"10.5220\/0006105602530262"},{"key":"270_CR21","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516","author":"A Javaid","year":"2015","unstructured":"Javaid A, Niyaz Q, Sun W, Alam M (2015) A deep learning approach for network intrusion detection system. EAI Endorsed Trans Secur Saf. \n                    https:\/\/doi.org\/10.4108\/eai.3-12-2015.2262516","journal-title":"EAI Endorsed Trans Secur Saf"},{"key":"270_CR22","unstructured":"Nour M, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military communications and information systems conference (MilCIS). IEEE"},{"key":"270_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19393555.2015.1124946","volume":"25","author":"M Nour","year":"2016","unstructured":"Nour M, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J Glob Perspect 25:1\u201314","journal-title":"Inf Secur J Glob Perspect"},{"key":"270_CR24","unstructured":"Sherif S, Traore I, Ghorbani A, Sayed B, Zhao D, Lu W, Felix J, Hakimian P (2011) Detecting P2P botnets through network behavior analysis and machine learning. In: Proceedings of 9th annual conference on privacy, security and trust (PST2011)"},{"issue":"3","key":"270_CR25","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani A (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357\u2013374","journal-title":"Comput Secur"},{"key":"270_CR26","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J Mchugh","year":"2000","unstructured":"Mchugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Inf Syst Secur 3:262\u2013294","journal-title":"ACM Trans Inf Syst Secur"},{"key":"270_CR27","unstructured":"French Chapter of Honenynet. \n                    http:\/\/www.honeynet.org\/chapters\/france"},{"key":"270_CR28","doi-asserted-by":"crossref","unstructured":"Szab\u00f3 G, Orincsay D, Malomsoky S, Szab\u00f3 I (2008) On the validation of traffic classification algorithms. In: Proceedings of the 9th international conference on passive and active network measurement, PAM. Springer, Berlin, pp 72\u201381","DOI":"10.1007\/978-3-540-79232-1_8"},{"key":"270_CR29","unstructured":"LBNL Enterprise Trace Repository (2005) \n                    http:\/\/www.icir.org\/enterprise-tracing"},{"key":"270_CR30","first-page":"118","volume":"11","author":"S Peddabachigari","year":"2004","unstructured":"Peddabachigari S, Abraham A, Thomas J (2004) Intrusion detection systems using decision trees and support vector machines. Int J Appl Sci Comput 11:118\u2013134","journal-title":"Int J Appl Sci Comput"},{"issue":"Part A","key":"270_CR31","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.proenv.2011.12.072","volume":"11","author":"B Jin","year":"2011","unstructured":"Jin B, Wang Y, Liu Z, Xue J (2011) A trust model based on cloud model and Bayesian networks. Procedia Environ Sci 11(Part A):452\u2013459","journal-title":"Procedia Environ Sci"},{"key":"270_CR32","unstructured":"Jordan A (2002) On discriminative vs. generative classifiers: a comparison of logistic regression and na\u00efve Bayes. In: Advances in neural information processing systems, vol 14, p 841"},{"issue":"1","key":"270_CR33","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi C et al (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42\u201357","journal-title":"J Netw Comput Appl"},{"key":"270_CR34","unstructured":"Waikato environment for knowledge analysis (WEKA) version 3.5.7. \n                    http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/\n                    \n                  . June 2008"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-019-00270-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11761-019-00270-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-019-00270-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T23:38:44Z","timestamp":1597102724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11761-019-00270-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["270"],"URL":"https:\/\/doi.org\/10.1007\/s11761-019-00270-0","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"7 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}