Research Article | Open Access | Download Full Text
Volume 1 | Issue 1 | Year 2023 | Article Id: CYS-V1I1P105 DOI: https://doi.org/10.59232/CYS-V1I1P105
Cyberattack Detection via Artificial Intelligence in Cloud Computing Environment
N.Suresh
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 04 Jun 2023 | 16 Jun 2023 | 02 Jul 2023 | 05 Jul 2023 |
Citation
N.Suresh. “Cyberattack Detection via Artificial Intelligence in Cloud Computing Environment.” DS Journal of Cyber Security, vol. 1, no. 1, pp. 46-52, 2023.
Abstract
Keywords
Cyber security, Cyberattack, Intrusion detection, Dimension reduction, Multi-Head LSTM, Deep Learning.
References
[1] Avinash Kumar et al., "Sarcasm Detection Using Multi-Head Attention Based Bidirectional LSTM," IEEE Access, vol. 8, pp. 6388-6397, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Jamal Raiyn, "A Survey of Cyber-Attack Detection Strategies," International Journal of Security and Its Applications, vol. 8, no. 1, pp. 247-256, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Alfonso Valdes, and Keith Skinner, "Adaptive, Model-Based Monitoring for Cyber-Attack Detection," Recent Advances in Intrusion Detection, RAID 2000, vol. 1907, pp. 80-93, 2000.
[4] Shailendra Singh, and Sanjay Silakari, "A Survey of Cyber-Attack Detection Systems," International Journal of Computer Science and Network Security, vol. 9, no. 5, pp. 1-10, 2009.
[Google Scholar] [Publisher Link]
[5] Nong Ye, Yebin Zhang, and C. M. Borror, "Robustness of the Markov-Chain Model for Cyber-Attack Detection," IEEE Transactions on Reliability, vol. 53, no. 1, pp. 116-123, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Eman Mousavinejad et al., "A Novel Cyber-Attack Detection Method in Networked Control Systems," IEEE Transactions on Cybernetics, vol. 48, no. 11, pp. 3254-3264, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Noam Ben-Asher, and Cleotilde Gonzalez, "Effects of Cyber Security Knowledge on Attack Detection," Computers in Human Behavior, vol. 48, pp. 51-61, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Usman Inayat et al., "Learning-Based Methods for Cyber-Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects," Electronics, vol. 11, no. 9, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Hadis Karimipour et al., "A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids," IEEE Access, vol. 7, pp. 80778-80788, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Abdulrahman Al-Abassi et al., "An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System," IEEE Access, vol. 8, pp. 83965-83973, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Rupinder Paul Khandpur et al., "Crowdsourcing Cybersecurity: Cyber-Attack Detection Using Social Media," CIKM '17: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 1049-1057, 2017.