{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T01:25:22Z","timestamp":1776389122048,"version":"3.51.2"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-024-00699-5","type":"journal-article","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T10:03:17Z","timestamp":1730109797000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach"],"prefix":"10.1186","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9039-8430","authenticated-orcid":false,"given":"Md. Sharafat","family":"Hossain","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5120-2911","authenticated-orcid":false,"given":"Md. Alamgir","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Md. Saiful","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"699_CR1","doi-asserted-by":"publisher","unstructured":"P. M. Mell and T. Grance, \u201cThe NIST definition of cloud computing,\u201d National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800\u2013145, 2011. https:\/\/doi.org\/10.6028\/NIST.SP.800-145","DOI":"10.6028\/NIST.SP.800-145"},{"key":"699_CR2","doi-asserted-by":"publisher","unstructured":"Md. A. Hossain and Md. A. Al Hasan. Improving cloud data security through hybrid verification technique based on biometrics and encryption system. Int J Comput Appl. 44;(5):455-464, May 2022, https:\/\/doi.org\/10.1080\/1206212X.2020.1809177","DOI":"10.1080\/1206212X.2020.1809177"},{"issue":"1","key":"699_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.297103","volume":"12","author":"MA Haque","year":"2022","unstructured":"Haque MA, Almrezeq N, Haque S, El-Aziz AAA (2022) Device Access Control and Key Exchange (DACK) Protocol for Internet of Things. Int J Cloud Appl Comput 12(1):1\u201314. https:\/\/doi.org\/10.4018\/IJCAC.297103","journal-title":"Int J Cloud Appl Comput"},{"issue":"10","key":"699_CR4","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1080\/1206212X.2019.1648632","volume":"43","author":"M. A Hossain","year":"2021","unstructured":"Hossain M. A, Ferdush J, Khatun M (2021) A study and implementation of large-scale log-determinant computation to cloud. Int J Comput Appl 43(10):1020\u20131028. https:\/\/doi.org\/10.1080\/1206212X.2019.1648632","journal-title":"Int J Comput Appl"},{"issue":"16","key":"699_CR5","doi-asserted-by":"publisher","first-page":"e8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"A Vakili","year":"2024","unstructured":"Vakili A, Al-Khafaji HM, Darbandi M, Heidari A, Jafari Navimipour N, Unal M (2024) A new service composition method in the cloud-based Internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurr Comput Pract Exp 36(16):e8091. https:\/\/doi.org\/10.1002\/cpe.8091","journal-title":"Concurr Comput Pract Exp"},{"key":"699_CR6","doi-asserted-by":"publisher","unstructured":"A. Heidari, N. J. Navimipour, and A. Otsuki, \u201cCloud-based non-destructive characterization,\u201d in Non-Destructive Material Characterization Methods, Elsevier, 2024, pp. 727\u2013765. https:\/\/doi.org\/10.1016\/B978-0-323-91150-4.00006-9","DOI":"10.1016\/B978-0-323-91150-4.00006-9"},{"key":"699_CR7","unstructured":"Bismah Nazim Killedar and Maaz Zahid Datey, \u201cThe Impact of Cloud Computing on Small and Medium-Sized Businesses,\u201d May 2023, https:\/\/doi.org\/10.5281\/ZENODO.8133455"},{"key":"699_CR8","doi-asserted-by":"publisher","unstructured":"Z. Alashhab, M. Anbar, M. Mahinderjit Singh, Z. Al-Sai, and S. Abu Alhayjaa, \u201cImpact of Coronavirus Pandemic Crisis on Technologies and Cloud Computing Applications,\u201d J. Electron. Sci. Technol., Nov. 2020, https:\/\/doi.org\/10.1016\/j.jnlest.2020.100059","DOI":"10.1016\/j.jnlest.2020.100059"},{"key":"699_CR9","doi-asserted-by":"publisher","unstructured":"Department of Computer Science and Engineering, SDM College of Engineering and Technology, Dharwad, Karnataka-580002, India, R. Yadawad, U. P. Kulkarni, and J. A. Alzubi, \u201cAuto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method,\u201d Int. J. Comput. Netw. Inf. Secur., vol. 16, no. 3, pp. 1\u201315, Jun. 2024, https:\/\/doi.org\/10.5815\/ijcnis.2024.03.01","DOI":"10.5815\/ijcnis.2024.03.01"},{"key":"699_CR10","doi-asserted-by":"publisher","unstructured":"A. Verma and S. Kaushal, \u201cCloud Computing Security Issues and Challenges: A Survey,\u201d in Advances in Computing and Communications, vol. 193, A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki, and S. M. Thampi, Eds., in Communications in Computer and Information Science, vol. 193. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 445\u2013454. https:\/\/doi.org\/10.1007\/978-3-642-22726-4_46","DOI":"10.1007\/978-3-642-22726-4_46"},{"issue":"2","key":"699_CR11","doi-asserted-by":"publisher","first-page":"192","DOI":"10.4304\/jetwi.6.2.192-199","volume":"6","author":"YK Sinjilawi","year":"2014","unstructured":"Sinjilawi YK, Al-Nabhan MQ, Abu-Shanab EA (2014) Addressing Security and Privacy Issues in Cloud Computing. J Emerg Technol Web Intell 6(2):192\u2013199. https:\/\/doi.org\/10.4304\/jetwi.6.2.192-199","journal-title":"J Emerg Technol Web Intell"},{"key":"699_CR12","doi-asserted-by":"publisher","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","volume":"9","author":"B Alouffi","year":"2021","unstructured":"Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M (2021) A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access 9:57792\u201357807. https:\/\/doi.org\/10.1109\/ACCESS.2021.3073203","journal-title":"IEEE Access"},{"issue":"13","key":"699_CR13","doi-asserted-by":"publisher","first-page":"4685","DOI":"10.3390\/s22134685","volume":"22","author":"THH Aldhyani","year":"2022","unstructured":"Aldhyani THH, Alkahtani H (2022) Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments. Sensors 22(13):4685. https:\/\/doi.org\/10.3390\/s22134685","journal-title":"Sensors"},{"issue":"1","key":"699_CR14","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11831-021-09573-y","volume":"29","author":"S El Kafhali","year":"2022","unstructured":"El Kafhali S, El Mir I, Hanini M (2022) Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing. Arch Comput Methods Eng 29(1):223\u2013246. https:\/\/doi.org\/10.1007\/s11831-021-09573-y","journal-title":"Arch Comput Methods Eng"},{"issue":"6","key":"699_CR15","doi-asserted-by":"publisher","first-page":"3587","DOI":"10.1007\/s11831-022-09708-9","volume":"29","author":"M Jangjou","year":"2022","unstructured":"Jangjou M, Sohrabi MK (2022) A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing. Arch Comput Methods Eng 29(6):3587\u20133608. https:\/\/doi.org\/10.1007\/s11831-022-09708-9","journal-title":"Arch Comput Methods Eng"},{"issue":"2","key":"699_CR16","doi-asserted-by":"publisher","first-page":"165","DOI":"10.37256\/aie.4220233337","volume":"4","author":"MdA Hossain","year":"2023","unstructured":"Hossain MdA (2023) Enhanced Ensemble-Based Distributed Denial-of-Service (DDoS) Attack Detection with Novel Feature Selection: A Robust Cybersecurity Approach. Artif Intell Evol 4(2):165\u2013186. https:\/\/doi.org\/10.37256\/aie.4220233337","journal-title":"Artif Intell Evol"},{"key":"699_CR17","doi-asserted-by":"publisher","unstructured":"G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, \u201cDDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions,\u201d 2015, https:\/\/doi.org\/10.48550\/ARXIV.1512.08187","DOI":"10.48550\/ARXIV.1512.08187"},{"key":"699_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/CLOUD.2011.45","volume-title":"Exploiting Cloud Utility Models for Profit and Ruin,\u201d in 2011 IEEE 4th International Conference on Cloud Computing","author":"J Idziorek","year":"2011","unstructured":"Idziorek J, Tannian M (2011) Exploiting Cloud Utility Models for Profit and Ruin,\u201d in 2011 IEEE 4th International Conference on Cloud Computing. IEEE, Washington, DC, pp 33\u201340. https:\/\/doi.org\/10.1109\/CLOUD.2011.45"},{"issue":"3","key":"699_CR19","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1007\/s13369-014-1548-y","volume":"40","author":"F Al-Haidari","year":"2015","unstructured":"Al-Haidari F, Sqalli M, Salah K (2015) Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services. Arab J Sci Eng 40(3):773\u2013785. https:\/\/doi.org\/10.1007\/s13369-014-1548-y","journal-title":"Arab J Sci Eng"},{"key":"699_CR20","doi-asserted-by":"publisher","unstructured":"F. Z. Chowdhury, L. B. M. Kiah, M. A. M. Ahsan, and M. Y. I. Bin Idris, \u201cEconomic denial of sustainability (EDoS) mitigation approaches in cloud: Analysis and open challenges,\u201d in 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), Palembang: IEEE, Aug. 2017, pp. 206\u2013211. https:\/\/doi.org\/10.1109\/ICECOS.2017.8167135","DOI":"10.1109\/ICECOS.2017.8167135"},{"key":"699_CR21","doi-asserted-by":"publisher","unstructured":"A. Shawahna, M. Abu-Amara, A. Mahmoud, and Y. E. Osais, \u201cEDoS-ADS: An Enhanced Mitigation Technique Against Economic Denial of Sustainability (EDoS) Attacks,\u201d IEEE Trans. Cloud Comput., pp. 1\u20131, 2018, https:\/\/doi.org\/10.1109\/TCC.2018.2805907","DOI":"10.1109\/TCC.2018.2805907"},{"issue":"06","key":"699_CR22","doi-asserted-by":"publisher","first-page":"1850049","DOI":"10.1142\/S1793962318500496","volume":"09","author":"S Bhingarkar","year":"2018","unstructured":"Bhingarkar S, Shah D (2018) FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing. Int J Model Simul Sci Comput 09(06):1850049. https:\/\/doi.org\/10.1142\/S1793962318500496","journal-title":"Int J Model Simul Sci Comput"},{"issue":"12","key":"699_CR23","doi-asserted-by":"publisher","first-page":"649","DOI":"10.3390\/e19120649","volume":"19","author":"M Monge","year":"2017","unstructured":"Monge M, Vidal J, Villalba L (2017) Entropy-Based Economic Denial of Sustainability Detection. Entropy 19(12):649. https:\/\/doi.org\/10.3390\/e19120649","journal-title":"Entropy"},{"key":"699_CR24","doi-asserted-by":"publisher","unstructured":"P. T. Dinh and M. Park, \u201cDynamic Economic-Denial-of-Sustainability (EDoS) Detection in SDN-based Cloud,\u201d in 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Paris, France: IEEE, Apr. 2020, pp. 62\u201369. https:\/\/doi.org\/10.1109\/FMEC49853.2020.9144972","DOI":"10.1109\/FMEC49853.2020.9144972"},{"issue":"1","key":"699_CR25","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.1109\/TCE.2024.3350231","volume":"70","author":"JA Alzubi","year":"2024","unstructured":"Alzubi JA, Alzubi OA, Qiqieh I, Singh A (2024) A Blended Deep Learning Intrusion Detection Framework for Consumable Edge-Centric IoMT Industry. IEEE Trans Consum Electron 70(1):2049\u20132057. https:\/\/doi.org\/10.1109\/TCE.2024.3350231","journal-title":"IEEE Trans Consum Electron"},{"key":"699_CR26","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.comcom.2021.11.008","volume":"182","author":"SQA Shah","year":"2022","unstructured":"Shah SQA, Khan FZ, Ahmad M (2022) Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. Comput Commun 182:198\u2013211. https:\/\/doi.org\/10.1016\/j.comcom.2021.11.008","journal-title":"Comput Commun"},{"key":"699_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.comnet.2016.01.002","volume":"97","author":"ZA Baig","year":"2016","unstructured":"Baig ZA, Sait SM, Binbeshr F (2016) Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Comput Netw 97:31\u201347. https:\/\/doi.org\/10.1016\/j.comnet.2016.01.002","journal-title":"Comput Netw"},{"key":"699_CR28","doi-asserted-by":"publisher","unstructured":"S. Q. Ali Shah, F. Zeeshan Khan, and M. Ahmad, \u201cThe impact and mitigation of ICMP based economic denial of sustainability attack in cloud computing environment using software defined network,\u201d Comput. Netw., vol. 187, p. 107825, Mar. 2021, https:\/\/doi.org\/10.1016\/j.comnet.2021.107825","DOI":"10.1016\/j.comnet.2021.107825"},{"key":"699_CR29","doi-asserted-by":"publisher","unstructured":"Y. Su, Y. Zhao, C. Niu, R. Liu, W. Sun, and D. Pei, \u201cRobust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network,\u201d in Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage AK USA: ACM, Jul. 2019, pp. 2828\u20132837. https:\/\/doi.org\/10.1145\/3292500.3330672","DOI":"10.1145\/3292500.3330672"},{"key":"699_CR30","doi-asserted-by":"publisher","unstructured":"D. Li, D. Chen, L. Shi, B. Jin, J. Goh, and S.-K. Ng, \u201cMAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks,\u201d 2019, arXiv. https:\/\/doi.org\/10.48550\/ARXIV.1901.04997","DOI":"10.48550\/ARXIV.1901.04997"},{"key":"699_CR31","doi-asserted-by":"publisher","first-page":"35057","DOI":"10.1109\/ACCESS.2021.3061601","volume":"9","author":"PT Dinh","year":"2021","unstructured":"Dinh PT, Park M (2021) R-EDoS: Robust Economic Denial of Sustainability Detection in an SDN-Based Cloud Through Stochastic Recurrent Neural Network. IEEE Access 9:35057\u201335074. https:\/\/doi.org\/10.1109\/ACCESS.2021.3061601","journal-title":"IEEE Access"},{"key":"699_CR32","doi-asserted-by":"publisher","unstructured":"S. B. Ribin Jones and N. Kumar, \u201cAn efficient EDoS-DOME system in cloud computing using obfuscated IP spoofing technique and RCDH-ENN detection technique,\u201d Appl. Nanosci., vol. 13, no. 2, pp. 1703\u20131715, Feb. 2023, https:\/\/doi.org\/10.1007\/s13204-021-02153-3","DOI":"10.1007\/s13204-021-02153-3"},{"issue":"20","key":"699_CR33","doi-asserted-by":"publisher","first-page":"2500","DOI":"10.3390\/electronics10202500","volume":"10","author":"VQ Ta","year":"2021","unstructured":"Ta VQ, Park M (2021) MAN-EDoS: A Multihead Attention Network for the Detection of Economic Denial of Sustainability Attacks. Electronics 10(20):2500. https:\/\/doi.org\/10.3390\/electronics10202500","journal-title":"Electronics"},{"key":"699_CR34","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J, \u201cUNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)\u201d, in, (2015) Military Communications and Information Systems Conference (MilCIS). Canberra, Australia: IEEE, Nov 2015:1\u20136. https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"2","key":"699_CR35","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s41635-018-0061-2","volume":"3","author":"H Abbasi","year":"2019","unstructured":"Abbasi H, Ezzati-Jivan N, Bellaiche M, Talhi C, Dagenais MR (2019) Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis. J Hardw Syst Secur 3(2):164\u2013176. https:\/\/doi.org\/10.1007\/s41635-018-0061-2","journal-title":"J Hardw Syst Secur"},{"key":"699_CR36","doi-asserted-by":"publisher","unstructured":"S. M, M. M, S. J, M. Suresh, P. G. Banupriya, and L. Dhavamani, \u201cDetection of EDoS attacks in SDN-based Cloud Model using Deep Learning based SDPN Technique,\u201d in 2022 Third International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), Bengaluru, India: IEEE, Dec. 2022, pp. 1\u20137. https:\/\/doi.org\/10.1109\/ICSTCEE56972.2022.10099583","DOI":"10.1109\/ICSTCEE56972.2022.10099583"},{"key":"699_CR37","doi-asserted-by":"publisher","unstructured":"I. Sharafaldin, A. Habibi Lashkari, and A. A. Ghorbani, \u201cToward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization:,\u201d in Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, Madeira, Portugal: SCITEPRESS - Science and Technology Publications, 2018, pp. 108\u2013116. https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"699_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CISDA.2009.5356528","volume":"2009","author":"M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani, \u201cA detailed analysis of the KDD CUP 99 data set\u201d, in","year":"2009","unstructured":"M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani, \u201cA detailed analysis of the KDD CUP 99 data set\u201d, in (2009) IEEE Symposium on Computational Intelligence for Security and Defense Applications. Ottawa, ON, Canada: IEEE, Jul 2009:1\u20136. https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","journal-title":"Ottawa, ON, Canada: IEEE, Jul"},{"key":"699_CR39","doi-asserted-by":"publisher","unstructured":"M. A. Hossain and M. S. Islam, \u201cEnsuring network security with a robust intrusion detection system using ensemble-based machine learning,\u201d Array, p. 100306, Jul. 2023, https:\/\/doi.org\/10.1016\/j.array.2023.100306","DOI":"10.1016\/j.array.2023.100306"},{"key":"699_CR40","doi-asserted-by":"publisher","unstructured":"H. I. H. Alsaadi, M. K. Al-Anni, and F. E. K. Al-Khuzaie, \u201cDeep Learning to Mitigate Economic Denial of Sustainability (EDoS) Attacks: Cloud Computing,\u201d in 2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA), Taiz, Yemen: IEEE, Oct. 2023, pp. 1\u20137. https:\/\/doi.org\/10.1109\/eSmarTA59349.2023.10293405","DOI":"10.1109\/eSmarTA59349.2023.10293405"},{"key":"699_CR41","doi-asserted-by":"publisher","unstructured":"Md. S. Hossain and Md. S. Islam, \u201cEconomic Denial of Sustainability Attack Detection Using Machine Learning,\u201d in 2023 26th International Conference on Computer and Information Technology (ICCIT), Cox\u2019s Bazar, Bangladesh: IEEE, Dec. 2023, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCIT60459.2023.10441045","DOI":"10.1109\/ICCIT60459.2023.10441045"},{"key":"699_CR42","doi-asserted-by":"publisher","unstructured":"Hossain Md. A, Islam Md. (2024) Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity. Meas Sens 32:101037. https:\/\/doi.org\/10.1016\/j.measen.2024.101037","DOI":"10.1016\/j.measen.2024.101037"},{"key":"699_CR43","unstructured":"F. Pedregosa et al., Scikit-learn: Machine Learning in Python. J Mach Learn Res2011;12(85)"},{"issue":"1","key":"699_CR44","doi-asserted-by":"publisher","first-page":"21207","DOI":"10.1038\/s41598-023-48230-1","volume":"13","author":"MdA Hossain","year":"2023","unstructured":"Hossain MdA, Islam MdS (2023) A novel hybrid feature selection and ensemble-based machine learning approach for botnet detection. Sci Rep 13(1):21207. https:\/\/doi.org\/10.1038\/s41598-023-48230-1","journal-title":"Sci Rep"},{"key":"699_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119030","volume":"213","author":"MHL Louk","year":"2023","unstructured":"Louk MHL, Tama BA (2023) Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst Appl 213:119030. https:\/\/doi.org\/10.1016\/j.eswa.2022.119030","journal-title":"Expert Syst Appl"},{"issue":"6","key":"699_CR46","doi-asserted-by":"publisher","first-page":"916","DOI":"10.3390\/electronics9060916","volume":"9","author":"J Kim","year":"2020","unstructured":"Kim J, Kim J, Kim H, Shim M, Choi E (2020) CNN-Based Network Intrusion Detection against Denial-of-Service Attacks. Electronics 9(6):916. https:\/\/doi.org\/10.3390\/electronics9060916","journal-title":"Electronics"},{"key":"699_CR47","doi-asserted-by":"publisher","unstructured":"L. D\u2019hooge, T. Wauters, B. Volckaert, and F. De Turck, \u201cInter-dataset generalization strength of supervised machine learning methods for intrusion detection,\u201d J. Inf. Secur. Appl., vol. 54, p. 102564, Oct. 2020, https:\/\/doi.org\/10.1016\/j.jisa.2020.102564","DOI":"10.1016\/j.jisa.2020.102564"},{"key":"699_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J Inf Secur Appl 50:102419. https:\/\/doi.org\/10.1016\/j.jisa.2019.102419","journal-title":"J Inf Secur Appl"},{"key":"699_CR49","doi-asserted-by":"publisher","unstructured":"P. Lin, K. Ye, and C.-Z. Xu, \u201cDynamic Network Anomaly Detection System by Using Deep Learning Techniques,\u201d in Cloud Computing \u2013 CLOUD 2019, vol. 11513, D. Da Silva, Q. Wang, and L.-J. Zhang, Eds., in Lecture Notes in Computer Science, vol. 11513. , Cham: Springer International Publishing, 2019, pp. 161\u2013176. https:\/\/doi.org\/10.1007\/978-3-030-23502-4_12","DOI":"10.1007\/978-3-030-23502-4_12"},{"issue":"1","key":"699_CR50","doi-asserted-by":"publisher","first-page":"199","DOI":"10.3390\/jcp1010011","volume":"1","author":"M Ahsan","year":"2021","unstructured":"Ahsan M, Gomes R, Chowdhury MdM, Nygard KE (2021) Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector. J Cybersecurity Priv 1(1):199\u2013218. https:\/\/doi.org\/10.3390\/jcp1010011","journal-title":"J Cybersecurity Priv"},{"issue":"1","key":"699_CR51","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset. J Big Data 7(1):105. https:\/\/doi.org\/10.1186\/s40537-020-00379-6","journal-title":"J Big Data"},{"key":"699_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2022.101322","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023) A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks. Eng Sci Technol Int J 38:101322. https:\/\/doi.org\/10.1016\/j.jestch.2022.101322","journal-title":"Eng Sci Technol Int J"},{"issue":"1","key":"699_CR53","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","volume":"10","author":"F Ullah","year":"2024","unstructured":"Ullah F, Ullah S, Srivastava G, Lin JC-W (2024) IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digit Commun Netw 10(1):190\u2013204. https:\/\/doi.org\/10.1016\/j.dcan.2023.03.008","journal-title":"Digit Commun Netw"},{"key":"699_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103587","volume":"137","author":"AV Turukmane","year":"2024","unstructured":"Turukmane AV, Devendiran R (2024) M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. Comput Secur 137:103587. https:\/\/doi.org\/10.1016\/j.cose.2023.103587","journal-title":"Comput Secur"},{"key":"699_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102804","volume":"58","author":"YN Kunang","year":"2021","unstructured":"Kunang YN, Nurmaini S, Stiawan D, Suprapto BY (2021) Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J Inf Secur Appl 58:102804. https:\/\/doi.org\/10.1016\/j.jisa.2021.102804","journal-title":"J Inf Secur Appl"},{"issue":"13","key":"699_CR56","doi-asserted-by":"publisher","first-page":"2849","DOI":"10.3390\/electronics12132849","volume":"12","author":"Y Song","year":"2023","unstructured":"Song Y, Luktarhan N, Shi Z, Wu H (2023) TGA: A Novel Network Intrusion Detection Method Based on TCN, BiGRU and Attention Mechanism. Electronics 12(13):2849. https:\/\/doi.org\/10.3390\/electronics12132849","journal-title":"Electronics"},{"key":"699_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/INCET61516.2024.10593561","volume-title":"Deep Neural Network Model for Improved DDoS Attack Detection in Cloud Environments, in 2024 5th International Conference for Emerging Technology (INCET)","author":"R Verma","year":"2024","unstructured":"Verma R, Jailia M, Kumar M, Kaliraman B (2024) Deep Neural Network Model for Improved DDoS Attack Detection in Cloud Environments, in 2024 5th International Conference for Emerging Technology (INCET). IEEE, Belgaum, pp 1\u20136. https:\/\/doi.org\/10.1109\/INCET61516.2024.10593561"},{"issue":"4","key":"699_CR58","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.3390\/app13042276","volume":"13","author":"S Alzughaibi","year":"2023","unstructured":"Alzughaibi S, El Khediri S (2023) A Cloud Intrusion Detection Systems Based on DNN Using Backpropagation and PSO on the CSE-CIC-IDS2018 Dataset. Appl Sci 13(4):2276. https:\/\/doi.org\/10.3390\/app13042276","journal-title":"Appl Sci"},{"issue":"3","key":"699_CR59","doi-asserted-by":"publisher","first-page":"2330","DOI":"10.1109\/JIOT.2022.3211346","volume":"10","author":"C Park","year":"2023","unstructured":"Park C, Lee J, Kim Y, Park J-G, Kim H, Hong D (2023) An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks. IEEE Internet Things J 10(3):2330\u20132345. https:\/\/doi.org\/10.1109\/JIOT.2022.3211346","journal-title":"IEEE Internet Things J"},{"key":"699_CR60","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo SM (2023) A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework. Comput Commun 199:113\u2013125. https:\/\/doi.org\/10.1016\/j.comcom.2022.12.010","journal-title":"Comput Commun"},{"issue":"1","key":"699_CR61","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1186\/s40537-023-00697-5","volume":"10","author":"A Shiravani","year":"2023","unstructured":"Shiravani A, Sadreddini MH, Nahook HN (2023) Network intrusion detection using data dimensions reduction techniques. J Big Data 10(1):27. https:\/\/doi.org\/10.1186\/s40537-023-00697-5","journal-title":"J Big Data"},{"key":"699_CR62","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1016\/j.procs.2024.03.285","volume":"233","author":"AD Vibhute","year":"2024","unstructured":"Vibhute AD, Patil CH, Mane AV, Kale KV (2024) Towards Detection of Network Anomalies using Machine Learning Algorithms on the NSL-KDD Benchmark Datasets. Procedia Comput Sci 233:960\u2013969. https:\/\/doi.org\/10.1016\/j.procs.2024.03.285","journal-title":"Procedia Comput Sci"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00699-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00699-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00699-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T10:08:12Z","timestamp":1730110092000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00699-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":62,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["699"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00699-5","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"21 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"151"}}