{"id":"https://openalex.org/W4281913699","doi":"https://doi.org/10.32604/iasc.2023.024291","title":"Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm","display_name":"Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm","publication_year":2022,"publication_date":"2022-06-06","ids":{"openalex":"https://openalex.org/W4281913699","doi":"https://doi.org/10.32604/iasc.2023.024291"},"language":"en","primary_location":{"id":"doi:10.32604/iasc.2023.024291","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.024291","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-1/TSP_IASC_24291/TSP_IASC_24291.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-1/TSP_IASC_24291/TSP_IASC_24291.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015328537","display_name":"R. S. Aashmi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"R. S. Aashmi","raw_affiliation_strings":["Department of Computer Science and Engineering, CSI Institute of Technology, Thovalai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, CSI Institute of Technology, Thovalai, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086968300","display_name":"T. Jaya","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"T. Jaya","raw_affiliation_strings":["Department of Electronic Communications and Engineering, CSI Institute of Technology, Thovalai, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Communications and Engineering, CSI Institute of Technology, Thovalai, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015328537"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2763,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54714594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"35","issue":"1","first_page":"79","last_page":"95"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9213024377822876},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9068355560302734},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.677513837814331},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5351005792617798},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.48085007071495056},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.4531649649143219},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4391896426677704},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4355739653110504},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42672401666641235},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.41716668009757996},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4080263674259186},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17762482166290283},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.1757510006427765},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1754988431930542}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9213024377822876},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9068355560302734},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.677513837814331},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5351005792617798},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.48085007071495056},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.4531649649143219},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4391896426677704},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4355739653110504},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42672401666641235},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.41716668009757996},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4080263674259186},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17762482166290283},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.1757510006427765},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1754988431930542},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/iasc.2023.024291","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.024291","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-1/TSP_IASC_24291/TSP_IASC_24291.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/iasc.2023.024291","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.024291","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-1/TSP_IASC_24291/TSP_IASC_24291.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4281913699.pdf","grobid_xml":"https://content.openalex.org/works/W4281913699.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W56921715","https://openalex.org/W142706014","https://openalex.org/W774302798","https://openalex.org/W1991471031","https://openalex.org/W1998496248","https://openalex.org/W2025183498","https://openalex.org/W2029025881","https://openalex.org/W2046819530","https://openalex.org/W2117698408","https://openalex.org/W2146189323","https://openalex.org/W2157861429","https://openalex.org/W2185217431","https://openalex.org/W2189004036","https://openalex.org/W2540352214","https://openalex.org/W2778138790","https://openalex.org/W2936508756","https://openalex.org/W3012382091","https://openalex.org/W3013386139","https://openalex.org/W3087556751","https://openalex.org/W3108694026","https://openalex.org/W3109036577","https://openalex.org/W3204337244","https://openalex.org/W6605750758","https://openalex.org/W6650900151","https://openalex.org/W6653018090","https://openalex.org/W6683281640","https://openalex.org/W6686893354","https://openalex.org/W6687265601","https://openalex.org/W6746791497","https://openalex.org/W6761302589"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4256682929","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410"],"abstract_inverted_index":{"Cloud":[0],"computing":[1],"is":[2,6,98,116],"the":[3,39,143,147,158,171],"technology":[4],"that":[5,36],"currently":[7],"used":[8],"to":[9,80,145],"provide":[10],"users":[11],"with":[12,157],"infrastructure,":[13],"platform,":[14],"and":[15,41,49,69,88,95,125,134],"software":[16],"services":[17],"effectively.":[18],"Under":[19],"this":[20,107],"system,":[21],"Platform":[22],"as":[23,175,177],"a":[24,28,32,99,103,117],"Service":[25,53,92],"(PaaS)":[26],"offers":[27],"medium":[29],"headed":[30],"for":[31,102,150,170],"web":[33],"development":[34],"platform":[35],"uniformly":[37],"distributes":[38],"requests":[40],"resources.":[42],"Hackers":[43],"using":[44],"Denial":[45,51,84,90],"of":[46,52,83,85,91,119,155,168],"service":[47,86],"(DoS)":[48,87],"Distributed":[50,89],"(DDoS)":[54,93],"attacks":[55,94],"abruptly":[56],"interrupt":[57],"these":[58],"requests.":[59,152],"Even":[60],"though":[61],"several":[62],"existing":[63],"methods":[64],"like":[65],"signature-based,":[66],"statistical":[67],"anomaly-based,":[68],"stateful":[70],"protocol":[71],"analysis":[72],"are":[73,76],"available,":[74],"they":[75],"not":[77],"sufficient":[78],"enough":[79],"get":[81],"rid":[82],"hence":[96],"there":[97],"great":[100],"need":[101],"definite":[104],"algorithm.":[105],"Concerning":[106],"issue,":[108],"we":[109],"propose":[110],"an":[111,163],"improved":[112],"hybrid":[113],"algorithm":[114],"which":[115],"combination":[118],"Multivariate":[120],"correlation":[121],"analysis,":[122],"Spearman":[123],"coefficient,":[124],"mitigation":[126],"technique.":[127],"It":[128],"can":[129],"easily":[130],"differentiate":[131],"common":[132],"traffic":[133],"attack":[135,174],"traffic.":[136],"Not":[137],"only":[138,149],"that,":[139],"it":[140],"greatly":[141],"helps":[142],"network":[144],"distribute":[146],"resources":[148],"authenticated":[151],"The":[153],"effects":[154],"comparing":[156],"normalized":[159],"information":[160],"have":[161],"shown":[162],"extra":[164],"encouraging":[165],"detection":[166],"accuracy":[167],"99%":[169],"numerous":[172],"DoS":[173],"well":[176],"DDoS":[178],"attacks.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
