{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T04:20:08Z","timestamp":1774239608916,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T00:00:00Z","timestamp":1710892800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T00:00:00Z","timestamp":1710892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing is a rapidly advancing technology with numerous benefits, such as increased availability, scalability, and flexibility. Relocating computing infrastructure to a network simplifies hardware and software resource monitoring in the cloud. Software-Defined Networking (SDN)-based cloud networking improves cloud infrastructure efficiency by dynamically allocating and utilizing network resources. While SDN cloud networks offer numerous advantages, they are vulnerable to Distributed Denial-of-Service (DDoS) attacks. DDoS attacks try to stop genuine users from using services and drain network resources to reduce performance or shut down services. However, early-stage detection of DDoS attack patterns in cloud environments remains challenging. Current methods detect DDoS at the SDN controller level, which is often time-consuming. We recommend focusing on SDN switches for early detection. Due to the large volume of data from diverse sources, we recommend traffic clustering and traffic anomalies prediction which is of DDoS attacks at each switch. Furthermore, to consolidate the data from multiple clusters, event correlation is performed to understand network behavior and detect coordinated attack activities. Many existing techniques stay behind for early detection and integration of multiple techniques to detect DDoS attack patterns. In this paper, we introduce a more efficient and effectively integrated SDN framework that addresses a gap in previous DDoS solutions. Our framework enables early and accurate detection of DDoS traffic patterns within SDN-based cloud environments. In this framework, we use Recursive Feature Elimination (RFE), Density Based Spatial Clustering (DBSCAN), time series techniques like Auto Regressive Integrated Moving Average (ARIMA), Lyapunov exponent, exponential smoothing filter, dynamic threshold, and lastly, Rule-based classifier. We have evaluated the proposed RDAER model on the CICDDoS 2019 dataset, that achieved an accuracy level of 99.92% and a fast detection time of 20\u00a0s, outperforming existing methods.<\/jats:p>","DOI":"10.1186\/s13677-024-00625-9","type":"journal-article","created":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T05:54:29Z","timestamp":1710914069000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["An integrated SDN framework for early detection of DDoS attacks in cloud computing"],"prefix":"10.1186","volume":"13","author":[{"given":"Asha Varma","family":"Songa","sequence":"first","affiliation":[]},{"given":"Ganesh Reddy","family":"Karri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"issue":"1","key":"625_CR1","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s11277-022-09960-z","volume":"128","author":"UA Butt","year":"2023","unstructured":"Butt UA, Amin R, Mehmood M, Aldabbas H, Alharbi MT, Albaqami N (2023) Cloud security threats and solutions: a survey. Wireless Pers Commun 128(1):387\u2013413","journal-title":"Wireless Pers Commun"},{"key":"625_CR2","doi-asserted-by":"crossref","unstructured":"Sharma VK, Singh A, Jaya KR, Bairwa AK, Srivastava DK (2022) Introduction to virtualization in cloud computing,\u201d In Machine Learning and Optimization Models for Optimization in Cloud. Chapman and Hall\/CRC. (pp. 1\u201314)","DOI":"10.1201\/9781003185376-1"},{"issue":"23","key":"625_CR3","doi-asserted-by":"publisher","first-page":"12441","DOI":"10.3390\/app122312441","volume":"12","author":"ZR Alashhab","year":"2022","unstructured":"Alashhab ZR, Anbar M, Singh MM, Hasbullah IH, Jain P, Al-Amiedy TA (2022) Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy. Appl Sci 12(23):12441","journal-title":"Appl Sci"},{"issue":"3","key":"625_CR4","doi-asserted-by":"publisher","first-page":"2743","DOI":"10.1007\/s11277-020-08042-2","volume":"116","author":"J Ramprasath","year":"2021","unstructured":"Ramprasath J, Seethalakshmi V (2021) Improved network monitoring using software-defined networking for ddos detection and mitigation evaluation. Wireless Pers Commun 116(3):2743\u20132757","journal-title":"Wireless Pers Commun"},{"key":"625_CR5","doi-asserted-by":"publisher","first-page":"107981","DOI":"10.1016\/j.comnet.2021.107981","volume":"192","author":"S Khorsandroo","year":"2021","unstructured":"Khorsandroo S, Sanchez AG, Tosun AS, Arco JM, Doriguzzi-Corin R (2021) Hybrid sdn evolution: a comprehensive survey of the state-of-the-art. Comput Netw 192:107981","journal-title":"Comput Netw"},{"issue":"3","key":"625_CR6","first-page":"15","volume":"13","author":"WG Gadallah","year":"2021","unstructured":"Gadallah WG, Omar NM, Ibrahim HM (2021) Machine learning-based distributed denial of service attacks detection technique using new features in software-defined networks. Int J Comput Netw Inform Secur 13(3):15\u201327","journal-title":"Int J Comput Netw Inform Secur"},{"key":"625_CR7","doi-asserted-by":"crossref","unstructured":"Rawat SG, Obaidat MS, Pundir S, Wazid M, Das AK, Singh DP, Hsiao KF (2023) A Survey of DDoS Attacks Detection Schemes in SDN Environment. In 2023 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 01\u201306). IEEE","DOI":"10.1109\/CITS58301.2023.10188707"},{"key":"625_CR8","doi-asserted-by":"publisher","first-page":"103093","DOI":"10.1016\/j.jnca.2021.103093","volume":"187","author":"IA Valdovinos","year":"2021","unstructured":"Valdovinos IA, Perez-Diaz JA, Choo KKR, Botero JF (2021) Emerging ddos attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions. J Netw ComputAppl 187:103093","journal-title":"J Netw ComputAppl"},{"key":"625_CR9","volume-title":"Security attacks in cloud computing","author":"P Pandey","year":"2021","unstructured":"Pandey P (2021) Security attacks in cloud computing"},{"key":"625_CR10","doi-asserted-by":"crossref","unstructured":"C\u00b8agatay Ates\u00b8, S\u02d8 uleyman\u00a8 Ozdel, and Emin Anar\u0131m, \u201c Graph\u2013based anomaly detection using fuzzy clustering,\u201d In International Conference on Intelligent and Fuzzy Systems, pp. 338\u2013345, 2019","DOI":"10.1007\/978-3-030-23756-1_42"},{"issue":"10","key":"625_CR11","first-page":"206","volume":"12","author":"MG Raj","year":"2021","unstructured":"Raj MG, Pani SK (2021) A meta-analytic review of intelligent intrusion detection techniques in cloud computing environment. Int J Adv Comput Sci Appl 12(10):206\u2013217","journal-title":"Int J Adv Comput Sci Appl"},{"key":"625_CR12","doi-asserted-by":"publisher","first-page":"80813","DOI":"10.1109\/ACCESS.2019.2922196","volume":"7","author":"S Dong","year":"2019","unstructured":"Dong S, Abbas K, Jain R (2019) A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 7:80813\u201380828","journal-title":"IEEE Access"},{"key":"625_CR13","doi-asserted-by":"publisher","first-page":"5039","DOI":"10.1109\/ACCESS.2019.2963077","volume":"8","author":"S Dong","year":"2019","unstructured":"Dong S, Sarem M (2019) DDoS attack detection method based on improved KNN with the degree of DDoS attack in software-defined networks. IEEE Access 8:5039\u20135048","journal-title":"IEEE Access"},{"key":"625_CR14","doi-asserted-by":"publisher","first-page":"101763","DOI":"10.1016\/j.cose.2020.101763","volume":"92","author":"A Dahiya","year":"2020","unstructured":"Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against ddos attacks. Comput Secur 92:101763","journal-title":"Comput Secur"},{"issue":"4","key":"625_CR15","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1007\/s10586-019-03031-y","volume":"23","author":"S MahdaviHezavehi","year":"2020","unstructured":"MahdaviHezavehi S, Rahmani R (2020) An anomalybased framework for mitigating effects of ddos attacks using a third party auditor in cloud computing environments. Cluster Comput 23(4):2609\u20132627","journal-title":"Cluster Comput"},{"key":"625_CR16","doi-asserted-by":"crossref","unstructured":"Sadeghpour S, Vlajic N, Madani P, Stevanovic D (2021) Unsupervised ML based detection of malicious web sessions with automated feature selection: Design and real-world validation. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), pp. 1\u20139, IEEE","DOI":"10.1109\/CCNC49032.2021.9369591"},{"key":"625_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2011-50","volume":"2011","author":"S Lee","year":"2011","unstructured":"Lee S, Kim G, Kim S (2011) Sequence-order-independent network profiling for detecting application layer ddos attacks. EURASIP J Wirel Commun Netw 2011:1\u20139","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"625_CR18","doi-asserted-by":"publisher","first-page":"103462","DOI":"10.1016\/j.cose.2023.103462","volume":"134","author":"MA Ribeiro","year":"2023","unstructured":"Ribeiro MA, Fonseca MSP, de Santi J (2023) Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks. Comput Secur 134:103462","journal-title":"Comput Secur"},{"issue":"1","key":"625_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2478\/cait-2019-0001","volume":"19","author":"B Venkatesh","year":"2019","unstructured":"Venkatesh B, Anuradha J (2019) A review of feature selection and its methods. Cybernetics Inform Technol 19(1):3\u201326","journal-title":"Cybernetics Inform Technol"},{"key":"625_CR20","first-page":"102587","volume":"54","author":"RF Fouladi","year":"2020","unstructured":"Fouladi RF, Ermis O, Anarim E (2020) A ddos attack detection and defense scheme using time-series analysis for sdn. J Inform Secur Appl 54:102587","journal-title":"J Inform Secur Appl"},{"key":"625_CR21","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.procs.2022.12.053","volume":"215","author":"MK Karthick","year":"2022","unstructured":"Karthick MK, Kiruthiga G, Saraswathi PM, Dhiyanesh B, Radha R (2022) A subset scaling recursive feature collection based DDoS detection using behavioural based ideal neural network for security in a cloud environment. Procedia Computer Science 215:509\u2013518","journal-title":"Procedia Computer Science"},{"key":"625_CR22","doi-asserted-by":"publisher","first-page":"4","DOI":"10.5121\/ijci.2023.120408","volume":"12","author":"H Alubaidan","year":"2023","unstructured":"Alubaidan H, Alzaher R, AlQhatani M, Mohammed R (2023) Ddos detection in Software-Defined Network (Sdn) using machine learning. Int J Cybernetics Inform 12:4","journal-title":"Int J Cybernetics Inform"},{"issue":"4","key":"625_CR23","doi-asserted-by":"publisher","first-page":"2302","DOI":"10.11591\/eei.v12i4.4711","volume":"12","author":"SS Samaan","year":"2023","unstructured":"Samaan SS, Jeiad HA (2023) Feature-based real-time distributed denial of service detection in SDN using machine learning and Spark. Bullet Electric Eng Inform 12(4):2302\u20132312","journal-title":"Bullet Electric Eng Inform"},{"key":"625_CR24","doi-asserted-by":"publisher","first-page":"109642","DOI":"10.1016\/j.comnet.2023.109642","volume":"225","author":"H Zhou","year":"2023","unstructured":"Zhou H, Zheng Y, Jia X, Shu J (2023) Collaborative prediction and detection of DDoS attacks in edge computing: a deep learning-based approach with distributed SDN. Comput Netw 225:109642","journal-title":"Comput Netw"},{"key":"625_CR25","doi-asserted-by":"crossref","unstructured":"Najafimehr M, Zarifzadeh S, Mostafavi S (2022) A hybrid machine learning approach for detecting unprecedented ddos attacks. J Supercomputing 1\u201331","DOI":"10.1007\/s11227-021-04253-x"},{"key":"625_CR26","doi-asserted-by":"publisher","first-page":"119346","DOI":"10.1109\/ACCESS.2020.3004258","volume":"8","author":"PT Dinh","year":"2020","unstructured":"Dinh PT, Park M (2020) ECSD: Enhanced compromised switch detection in an SDN-based cloud through multivariate time-series analysis. IEEE Access 8:119346\u2013119360","journal-title":"IEEE Access"},{"key":"625_CR27","doi-asserted-by":"publisher","first-page":"27809","DOI":"10.1109\/ACCESS.2018.2839684","volume":"6","author":"H Peng","year":"2018","unstructured":"Peng H, Sun Z, Zhao X, Tan S, Sun Z (2018) A detection method for anomaly flow in software defined network. IEEE Access 6:27809\u201327817","journal-title":"IEEE Access"},{"key":"625_CR28","doi-asserted-by":"crossref","unstructured":"Jose Su\u00b4 arez-Varela and Pere Barlet-Ros (2018) Flow monitoring in software-\u2019 defined networks: finding the accuracy\/performance tradeoffs. Comput Netw 135:289\u2013301","DOI":"10.1016\/j.comnet.2018.02.020"},{"issue":"2s","key":"625_CR29","first-page":"268","volume":"10","author":"CR Manjunath","year":"2022","unstructured":"Manjunath CR, Rathor K, Kulkarni N, Patil PP, Patil MS, Singh J (2022) Cloud based DDOS attack detection using machine learning architectures: understanding the potential for scientific applications. Int J Intell Syst Appl Eng 10(2s):268\u2013271","journal-title":"Int J Intell Syst Appl Eng"},{"key":"625_CR30","first-page":"436","volume":"33","author":"M Aamir","year":"2021","unstructured":"Aamir M, Ali Zaidi SM (2021) Clustering based semisupervised machine learning for ddos attack classification. J King Saud Univ Comput Inform Sci 33:436\u2013446","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"625_CR31","doi-asserted-by":"publisher","first-page":"2732","DOI":"10.1109\/TIFS.2022.3172598","volume":"17","author":"M Hajimaghsoodi","year":"2022","unstructured":"Hajimaghsoodi M, Jalili R (2022) Rad: a statistical mechanism based on behavioral analysis for ddos attack countermeasure. IEEE Trans Inf Forensics Secur 17:2732\u20132745","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"625_CR32","doi-asserted-by":"publisher","first-page":"9603","DOI":"10.1007\/s00521-019-04473-6","volume":"32","author":"T Raja Sree","year":"2020","unstructured":"Raja Sree T, Mary SairaBhanu S (2020) Detection of http flooding attacks in cloud using fuzzy bat clustering. Neural Comput Appl 32:9603\u20139619","journal-title":"Neural Comput Appl"},{"key":"625_CR33","doi-asserted-by":"crossref","unstructured":"Girish L, Rao SK (2021) Anomaly detection in cloud environment using artificial intelligence techniques. Computing 1\u201314","DOI":"10.1007\/s00607-021-00941-x"},{"key":"625_CR34","unstructured":"Zelaya C. V. G. (2019). Towards explaining the effects of data preprocessing on machine learning. In 2019 IEEE 35th international conference on data engineering (ICDE) (pp. 2086\u20132019). IEEE"},{"key":"625_CR35","first-page":"1","volume":"2020","author":"W Lian","year":"2020","unstructured":"Lian W, Nie G, Jia B, Shi D, Fan Qi, Liang Y (2020) An in trusion detection method based on decision tree-recursive feature elimination in ensemble learning. Math Probl Eng 2020:1\u201315","journal-title":"Math Probl Eng"},{"key":"625_CR36","unstructured":"Lonnie Shumirai Matsa, Guy-Alain Zodi-Lusilao, and Fungai Bhunu Shava, \u201cRecursive feature elimination for ddos detection on software define network,\u201d In 2021 IST-Africa Conference (IST-Africa), pp. 1\u2013 10. IEEE, 2021"},{"issue":"1","key":"625_CR37","first-page":"359","volume":"14","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Kumar Y (2022) Multi-step time series analysis and forecasting strategy using arima and evolutionary algorithms. Int J Inf Technol 14(1):359\u2013373","journal-title":"Int J Inf Technol"},{"key":"625_CR38","doi-asserted-by":"crossref","unstructured":"S de O Domingos, Joao FL de Oliveira, and Paulo SG de Mattos Neto (2019) An intelligent hybridization of arima with machine learning models for time series forecasting. Knowledge-Based Systems 175:72\u201386","DOI":"10.1016\/j.knosys.2019.03.011"},{"key":"625_CR39","doi-asserted-by":"crossref","unstructured":"Jain G, Mallick B (2017) A study of time series models arima and ets. Environ Anthropol eJournal","DOI":"10.2139\/ssrn.2898968"},{"issue":"1","key":"625_CR40","first-page":"1","volume":"4","author":"MA Jun","year":"2022","unstructured":"Jun MA (2022) Chaos theory and applications, the physical evidence, mechanism are important in chaotic systems. Chaos Theor Appl 4(1):1\u20133","journal-title":"Chaos Theor Appl"},{"key":"625_CR41","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (ddos) attack dataset and taxonomy,\u201d In 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u2013, IEEE","DOI":"10.1109\/CCST.2019.8888419"},{"key":"625_CR42","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A (2019) A survey of network-based intrusion detection data sets. Comput Secur 86:147\u2013167","journal-title":"Comput Secur"},{"key":"625_CR43","doi-asserted-by":"publisher","first-page":"64351","DOI":"10.1109\/ACCESS.2019.2917532","volume":"7","author":"Gu Yonghao","year":"2019","unstructured":"Yonghao Gu, Li K, Guo Z, Wang Y (2019) Semisupervised k-means ddos detection method using hybrid feature selection algorithm. IEEE Access 7:64351\u201364365","journal-title":"IEEE Access"},{"issue":"6","key":"625_CR44","doi-asserted-by":"publisher","first-page":"3570","DOI":"10.11591\/eei.v11i6.4353","volume":"11","author":"MN Jasim","year":"2022","unstructured":"Jasim MN, Gaata MT (2022) K-Means clustering-based semi-supervised for DDoS attacks classification. Bullet Electric Eng Inform 11(6):3570\u20133576","journal-title":"Bullet Electric Eng Inform"},{"key":"625_CR45","doi-asserted-by":"publisher","first-page":"102107","DOI":"10.1016\/j.cose.2020.102107","volume":"100","author":"X Liu","year":"2021","unstructured":"Liu X, Ren J, He H, Wang Q, Song C (2021) Lowrate ddos attacks detection method using data compression and behavior divergence measurement. Comput Secur 100:102107","journal-title":"Comput Secur"},{"key":"625_CR46","first-page":"102621","volume":"55","author":"J David","year":"2020","unstructured":"David J, Thomas C (2020) Detection of distributed denial of service and existing methods attacks based on information theoretic approach in time series models. J Inform Secur Appl. 55:102621","journal-title":"J Inform Secur Appl."},{"key":"625_CR47","doi-asserted-by":"crossref","unstructured":"Maheshwari V, Bhatia A, Kumar K (2018) Faster detection and prediction of ddos attacks using mapreduce and time series analysis. In 2018 International Conference on Information Networking (ICOIN), pp 556\u2013561","DOI":"10.1109\/ICOIN.2018.8343180"},{"issue":"1","key":"625_CR48","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.aej.2021.06.033","volume":"61","author":"AS Alghawli","year":"2022","unstructured":"Alghawli AS (2022) Complex methods detect anomalies in real time based on time series analysis. Alex Eng J 61(1):549\u2013561","journal-title":"Alex Eng J"},{"key":"625_CR49","first-page":"102532","volume":"53","author":"GS Kushwah","year":"2020","unstructured":"Kushwah GS, Ranga V (2020) Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J Inform Secur Appl 53:102532","journal-title":"J Inform Secur Appl"},{"issue":"1","key":"625_CR50","first-page":"1626","volume":"29","author":"SI Shyla","year":"2020","unstructured":"Shyla SI, Sujatha SS (2020) Cloud security: LKM and optimal fuzzy system for intrusion detection in cloud environment. J Intell Syst 29(1):1626\u20131642","journal-title":"J Intell Syst"},{"key":"625_CR51","doi-asserted-by":"publisher","first-page":"106997","DOI":"10.1016\/j.asoc.2020.106997","volume":"100","author":"R SaiSindhuTheja","year":"2021","unstructured":"SaiSindhuTheja R, Shyam GK (2021) An efficient metaheuristic algorithm based feature selection and recurrent neural network for dos attack detection in cloud computing environment. Appl Soft Comput 100:106997","journal-title":"Appl Soft Comput"},{"issue":"2","key":"625_CR52","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s12065-019-00340-4","volume":"14","author":"DJ Prathyusha","year":"2021","unstructured":"Prathyusha DJ, Kannayaram G (2021) A cognitive mechanism for mitigating ddos attacks using the artificial immune system in a cloud environment. Evol Intell 14(2):607\u2013618","journal-title":"Evol Intell"},{"key":"625_CR53","doi-asserted-by":"publisher","first-page":"181916","DOI":"10.1109\/ACCESS.2020.3028690","volume":"8","author":"A Bhardwaj","year":"2020","unstructured":"Bhardwaj A, Mangat V, Vig R (2020) Hyperband tuned deep neural network with well posed stacked sparse autoencoder for detection of ddos attacks in cloud. IEEE Access 8:181916\u2013181929","journal-title":"IEEE Access"},{"key":"625_CR54","volume-title":"Network intrusion detection for distributed denial ofservice (ddos) attacks using machine learning classification techniques","author":"YS Hussain","year":"2020","unstructured":"Hussain YS (2020) Network intrusion detection for distributed denial ofservice (ddos) attacks using machine learning classification techniques"},{"key":"625_CR55","doi-asserted-by":"publisher","unstructured":"D.V.V.S. Manikumar and B Uma Maheswari. Blockchain based ddos mitigation using machine learning tech- niques. In 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), pages 794\u2013800, 2020. doi: https:\/\/doi.org\/10.1109\/ICIRCA48905.2020.9183092","DOI":"10.1109\/ICIRCA48905.2020.9183092"},{"key":"625_CR56","doi-asserted-by":"publisher","first-page":"19723","DOI":"10.1109\/ACCESS.2021.3054688","volume":"9","author":"S Rajagopal","year":"2021","unstructured":"Rajagopal S, Kundapur PP, Hareesha KS (2021) Towards effective network intrusion detection: From concept to creation on azure cloud. IEEE Access 9:19723\u201319742. https:\/\/doi.org\/10.1109\/ACCESS.2021.3054688","journal-title":"IEEE Access"},{"key":"625_CR57","doi-asserted-by":"publisher","unstructured":"Khoei TT, Aissou G, Hu WC, Kaabouch N (2021) Ensemble learning methods for anomaly intrusion detection system in smart grid. In 2021 IEEE International Conference on Electro Infor- mation Technology (EIT). 129\u2013135. https:\/\/doi.org\/10.1109\/EIT51626.2021.9491891","DOI":"10.1109\/EIT51626.2021.9491891"},{"key":"625_CR58","doi-asserted-by":"publisher","first-page":"102544","DOI":"10.1016\/j.simpat.2022.102544","volume":"118","author":"M Almiani","year":"2022","unstructured":"Almiani M, Abughazleh A, Jararweh Y, Razaque A (2022) Resilient back propagation neural network security model for containerized cloud computing. Simul Model Pract Theory 118:102544","journal-title":"Simul Model Pract Theory"},{"issue":"6","key":"625_CR59","doi-asserted-by":"publisher","first-page":"e2152","DOI":"10.1002\/nem.2152","volume":"31","author":"M Marvi","year":"2021","unstructured":"Marvi M, Arfeen A, Uddin R (2021) A generalized machine learning-based model for the detection of ddos attacks. Int J Netw Manage 31(6):e2152","journal-title":"Int J Netw Manage"},{"key":"625_CR60","doi-asserted-by":"publisher","DOI":"10.5152\/electrica.2020.20049","volume-title":"Detection of ddos attacks using machine learning methods","author":"T Aytac","year":"2020","unstructured":"Aytac T, Ali Ayd\u0131n M, Zaim AH (2020) Detection of ddos attacks using machine learning methods"},{"key":"625_CR61","doi-asserted-by":"publisher","first-page":"108498","DOI":"10.1016\/j.comnet.2021.108498","volume":"200","author":"RK Batchu","year":"2021","unstructured":"Batchu RK, Seetha H (2021) A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning. Comput Netw 200:108498","journal-title":"Comput Netw"},{"key":"625_CR62","doi-asserted-by":"crossref","unstructured":"Daffu P, Kaur A (2016) Mitigation of ddos attacks in cloud computing. In 2016 5th International Conference on Wireless Networks and Embedded Systems (WECON), pages 1\u20135. IEEE","DOI":"10.1109\/WECON.2016.7993478"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00625-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00625-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00625-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T06:08:25Z","timestamp":1710914905000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00625-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,20]]},"references-count":62,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["625"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00625-9","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,20]]},"assertion":[{"value":"28 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"64"}}