{"id":"https://openalex.org/W4396852847","doi":"https://doi.org/10.1145/3647444.3652452","title":"Machine Learning-Based Trust-Aware Secure TrafficMechanism to Identify DDOS Attacks over Cloud","display_name":"Machine Learning-Based Trust-Aware Secure TrafficMechanism to Identify DDOS Attacks over Cloud","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396852847","doi":"https://doi.org/10.1145/3647444.3652452"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3652452","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3652452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092529020","display_name":"Harish Reddy Gantla","orcid":"https://orcid.org/0009-0005-8307-7883"},"institutions":[{"id":"https://openalex.org/I149313025","display_name":"Vignan's Foundation for Science, Technology & Research","ror":"https://ror.org/03bzf1g85","country_code":"IN","type":"education","lineage":["https://openalex.org/I149313025"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Harish Reddy Gantla","raw_affiliation_strings":["Department of CSE, Vignan Institute of Technology and Science, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Vignan Institute of Technology and Science, India","institution_ids":["https://openalex.org/I149313025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072600155","display_name":"Sayed Sayeed Ahmad","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sayed Sayeed Ahmad","raw_affiliation_strings":["School of Engineering and Computing, De Montfort University, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Computing, De Montfort University, United Arab Emirates","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035020545","display_name":"Atheer A. Matroud","orcid":"https://orcid.org/0000-0002-2734-532X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Atheer Matroud","raw_affiliation_strings":["School of Engineering and Computing, De Montfort University, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Computing, De Montfort University, United Arab Emirates","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020876090","display_name":"Satish Kumar Kalhotra","orcid":"https://orcid.org/0000-0003-2685-4111"},"institutions":[{"id":"https://openalex.org/I286135121","display_name":"Rajiv Gandhi University of Health Sciences","ror":"https://ror.org/0157vkf66","country_code":"IN","type":"education","lineage":["https://openalex.org/I286135121"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Satish Kumar Kalhotra","raw_affiliation_strings":["Department of Education, Rajiv Gandhi University, India"],"affiliations":[{"raw_affiliation_string":"Department of Education, Rajiv Gandhi University, India","institution_ids":["https://openalex.org/I286135121"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009424497","display_name":"Indu Agarwal","orcid":"https://orcid.org/0009-0005-3263-0714"},"institutions":[{"id":"https://openalex.org/I3130021832","display_name":"Shree Guru Gobind Singh Tricentenary University","ror":"https://ror.org/04kf25f32","country_code":"IN","type":"education","lineage":["https://openalex.org/I3130021832"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Indu Agarwal","raw_affiliation_strings":["Department of CSE, SGT University, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, SGT University, India","institution_ids":["https://openalex.org/I3130021832"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034870139","display_name":"Sandeep Gupta","orcid":"https://orcid.org/0000-0002-3734-3723"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sandeep Gupta","raw_affiliation_strings":["Department of Electrical Engineering, Graphic Era (Deemed to be University), India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Graphic Era (Deemed to be University), India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034388705","display_name":"Udit Mamodiya","orcid":"https://orcid.org/0000-0002-8022-4252"},"institutions":[{"id":"https://openalex.org/I4210126659","display_name":"Poornima University","ror":"https://ror.org/03gnqp653","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210126659"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Udit Mamodiya","raw_affiliation_strings":["Poornima University, India"],"affiliations":[{"raw_affiliation_string":"Poornima University, India","institution_ids":["https://openalex.org/I4210126659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5092529020"],"corresponding_institution_ids":["https://openalex.org/I149313025"],"apc_list":null,"apc_paid":null,"fwci":0.1997,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5719119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7810975313186646},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7601633071899414},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6980139017105103},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6379894614219666},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5034956336021423},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.329693466424942},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21038568019866943},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12650340795516968},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12208086252212524}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7810975313186646},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7601633071899414},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6980139017105103},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6379894614219666},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5034956336021423},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.329693466424942},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21038568019866943},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12650340795516968},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12208086252212524}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3652452","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3652452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2899717508","https://openalex.org/W2912944969","https://openalex.org/W2952314417","https://openalex.org/W2967136126","https://openalex.org/W2973528622","https://openalex.org/W3008243670","https://openalex.org/W3092201318","https://openalex.org/W3093591719","https://openalex.org/W3126956508","https://openalex.org/W3134111902","https://openalex.org/W3176269432","https://openalex.org/W3176886883","https://openalex.org/W3191493850","https://openalex.org/W3216826992","https://openalex.org/W4210697956","https://openalex.org/W4226256448"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2898696280","https://openalex.org/W2921433547","https://openalex.org/W2958385475","https://openalex.org/W4377970398","https://openalex.org/W2185673024","https://openalex.org/W1484565796","https://openalex.org/W3026018975"],"abstract_inverted_index":{"Aiming":[0],"at":[1],"the":[2,12,15,43,53,58,68,72,78,90,98,104,108,113,132,138,144,147,152,158,164,179,182,188,196,207,214,221],"problems":[3],"of":[4,7,55,71,94,106,135,141,181,210,225],"distributed":[5],"denial":[6],"service":[8,74],"(DDoS)":[9],"attacks":[10],"in":[11,29,42,112,187],"cloud":[13,44,73,190],"environment,":[14],"encrypted":[16,40,101,122],"attack":[17,63],"traffic":[18,41,93,116,123,168,204,209,223],"is":[19,117,160,176,185],"more":[20,22,27],"concealed,":[21],"accessible":[23],"to":[24,57,88],"initiate,":[25],"and":[26,66,76,85,124,151,157,205],"significant":[28],"scale.":[30],"This":[31,50],"paper":[32],"proposes":[33],"a":[34,167],"trust-based":[35],"DDoS":[36,62,211],"discovery":[37],"method":[38,184,199],"for":[39,100,120],"environment":[45],"named":[46],"as":[47],"Trust":[48,197],"Cloud.":[49],"technique":[51],"adds":[52],"concept":[54],"trust":[56,79],"current":[59],"machine":[60],"learning-based":[61],"detection":[64],"system,":[65],"combines":[67],"security":[69],"authentication":[70],"itself,":[75],"integrates":[77],"evaluation":[80],"mechanism":[81],"based":[82,162,171],"on":[83,163,172],"signature":[84],"environmental":[86],"factors":[87],"filter":[89],"apparently":[91],"non-attack":[92],"legitimate":[95,114,226],"tenants,":[96],"without":[97],"need":[99],"traffic.":[102],"Under":[103],"premise":[105],"decryption,":[107],"sensitive":[109,222],"information":[110,224],"contained":[111],"tenant":[115],"guaranteed.":[118],"Afterwards,":[119],"other":[121],"non-encrypted":[125],"traffic,":[126],"five":[127],"features":[128],"are":[129],"introduced,":[130],"namely,":[131],"median":[133,139],"value":[134,140],"flow":[136,142],"packets,":[137],"bytes,":[143],"convection":[145],"ratio,":[146],"port":[148],"speed":[149,155],"increase,":[150,156],"source":[153],"IP":[154],"Ball-tree":[159],"constructed":[161],"features.":[165],"And":[166],"classification":[169],"algorithm":[170],"k-nearest":[173],"neighbors":[174],"(kNN)":[175],"proposed.":[177],"Finally,":[178],"effect":[180],"proposed":[183],"tested":[186],"OpenStack":[189],"environment.":[191],"The":[192],"experiments":[193],"show":[194],"that":[195],"Cloud":[198],"can":[200,218],"quickly":[201],"detect":[202],"abnormal":[203],"identify":[206],"early":[208],"attacks.":[212],"At":[213],"same":[215],"time,":[216],"it":[217],"effectively":[219],"protect":[220],"users.":[227]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
