Malicious host detection and classification in cloud forensics with DNN and SFLO approaches
The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones, desktop computers, and notebook users. Cloud service enable the authorization practice due to an increasing number of cloud service users. Cloud se...
Saved in:
Published in: | International journal of system assurance engineering and management Vol. 15; no. 2; pp. 578 - 590 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
New Delhi
Springer India
01-02-2024
Springer Nature B.V |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones, desktop computers, and notebook users. Cloud service enable the authorization practice due to an increasing number of cloud service users. Cloud service employs different host to deliver service to the users. But some hosts may be malicious and steal the user’s information or else it provides an unwanted file instead of original files to the user. In previous works, this malicious hosts are identified by site re-routing links, distinguishing file types and so on. The main impact of this malicious host is that it delivers infected data or files to the user or it divert the user to the non-requested data and files. In this paper, we focus on identification and classification of malicious hosts. The host list is examined to extract the features of malicious host by applying firefly algorithm. This identified features are then pre-processed by principal component analysis (PCA) method. The Deep Neural Network based Shuffled Frog Leap Optimization (DNN-SFLO) algorithm is a famous deep learning (DL) approach proposed to test the optimized weights of an identified features. DNN-SFLO accurately detects the malicious host, because the presence of malicious host may affect the cloud service. Performance of DNN-SFLO based host detection is compared with Naïve Bayes, Neural Network (NN), Artificial NN (ANN), Fuzzy C-Means (FCM), Fuzzy k-Nearest Neighbour (FKNN), Support vector machine (SVM). Implementation for this host detection process is carried out in python. The performance metrics taken to evaluate the effectiveness of DNN-SFLO is F-measure, precision, G-mean, sensitivity, error detection probability, and recall |
---|---|
AbstractList | The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones, desktop computers, and notebook users. Cloud service enable the authorization practice due to an increasing number of cloud service users. Cloud service employs different host to deliver service to the users. But some hosts may be malicious and steal the user’s information or else it provides an unwanted file instead of original files to the user. In previous works, this malicious hosts are identified by site re-routing links, distinguishing file types and so on. The main impact of this malicious host is that it delivers infected data or files to the user or it divert the user to the non-requested data and files. In this paper, we focus on identification and classification of malicious hosts. The host list is examined to extract the features of malicious host by applying firefly algorithm. This identified features are then pre-processed by principal component analysis (PCA) method. The Deep Neural Network based Shuffled Frog Leap Optimization (DNN-SFLO) algorithm is a famous deep learning (DL) approach proposed to test the optimized weights of an identified features. DNN-SFLO accurately detects the malicious host, because the presence of malicious host may affect the cloud service. Performance of DNN-SFLO based host detection is compared with Naïve Bayes, Neural Network (NN), Artificial NN (ANN), Fuzzy C-Means (FCM), Fuzzy k-Nearest Neighbour (FKNN), Support vector machine (SVM). Implementation for this host detection process is carried out in python. The performance metrics taken to evaluate the effectiveness of DNN-SFLO is F-measure, precision, G-mean, sensitivity, error detection probability, and recall |
Author | Munesh Chandra, T. Nandita, G. |
Author_xml | – sequence: 1 givenname: G. orcidid: 0000-0002-8799-1542 surname: Nandita fullname: Nandita, G. email: nandita.goyal@abes.ac.in organization: Dr. APJ Abdul, Kalam Technical University – sequence: 2 givenname: T. surname: Munesh Chandra fullname: Munesh Chandra, T. organization: Department of Computer Science and Engineering, National Institute of Technology |
BookMark | eNp9kLtOwzAUhi1UJErpCzBZYg74lsQeUaGAVNoBmBgsx3aoq2IXOxXl7TEJEhvTOTr6L0ffKRj54C0A5xhdYoTqq4QpFrxABBcI44oXhyMwRqKuCkYZH_V7WVQciRMwTWmDEMIEM8LQGLw-qq3TLuwTXIfUQWM7qzsXPFTeQL1VKbnWadWfnM-XsDewDdH65HSCn65bw5vlspc_zRcrqHa7GJRe23QGjlu1TXb6OyfgZX77PLsvFqu7h9n1otD5764wAjGBqSXWcMEMtQa3rMEVLW1Lq6biNa9brpuGU8Ys402jMWtYSQTXBtU1nYCLITcXf-xt6uQm7KPPlZIIiinhZcmzigwqHUNK0bZyF927il8SI_nDUQ4cZeYoe47ykE10MKUs9m82_kX_4_oGu6d3nQ |
CitedBy_id | crossref_primary_10_1007_s13198_023_02217_3 |
Cites_doi | 10.1007/s12652-015-0341-4 10.1093/icesjms/fsx223 10.1007/s11390-013-1410-9 10.1002/cpe.3855 10.1007/s10844-015-0388-x 10.1109/TIFS.2016.2523941 10.1109/MCC.2016.79 10.1016/j.asoc.2015.04.045 10.1007/s00500-015-1817-z 10.1007/s11036-015-0644-x 10.1016/j.jprocont.2017.03.004 10.1016/j.jpdc.2016.11.003 10.1016/j.fsigen.2017.08.008 10.1016/j.compind.2017.05.006 10.1109/TETC.2016.2633228 10.1155/2016/2401496 10.1016/j.procs.2016.05.202 10.1016/j.cose.2014.11.006 10.1109/MCC.2016.5 10.1016/j.diin.2012.07.001 10.1016/j.still.2017.04.009 10.1109/JSYST.2016.2574719 10.1016/j.diin.2012.05.001 10.1002/cpe.3868 10.1007/s10723-018-9465-z 10.1016/j.diin.2013.02.004 10.1007/s10586-018-1696-z 10.1109/INISTA.2013.6577619 10.1145/3159652.3159736 10.1109/ICITST.2009.5402561 10.1007/978-3-642-24212-0_3 10.1109/COMPSAC.2015.173 10.1109/ISDEA.2012.29 10.1109/HICSS.2011.386 10.14722/ndss.2018.23204 10.1109/FSKD.2017.8393359 10.1007/978-981-10-3322-3_7 10.1109/SERVICES.2011.91 10.1109/SADFE.2011.17 |
ContentType | Journal Article |
Copyright | The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2021 The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2021. |
Copyright_xml | – notice: The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2021 – notice: The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2021. |
DBID | AAYXX CITATION |
DOI | 10.1007/s13198-021-01168-x |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 0976-4348 |
EndPage | 590 |
ExternalDocumentID | 10_1007_s13198_021_01168_x |
GroupedDBID | -EM 06D 203 29~ 2JY 30V 406 40D 96X AAFGU AAHNG AAIAL AAJKR AANZL AARHV AARTL AATNV AATVU AAUYE AAWCG AAYFA AAYIU AAYQN AAYTO AAZMS ABBXA ABDZT ABECU ABFGW ABFTV ABHQN ABJNI ABJOX ABKAS ABKCH ABMQK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBMV ACBRV ACBYP ACGFS ACHSB ACIGE ACIPQ ACIWK ACKNC ACMLO ACOKC ACTTH ACVWB ACWMK ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMDM ADOXG ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFTE AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AESKC AESTI AETCA AEVLU AEVTX AEXYK AFLOW AFNRJ AFQWF AFWTZ AFZKB AGAYW AGDGC AGGBP AGJBK AGMZJ AGQEE AGQMX AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJZVZ AKLTO AKQUC ALFXC ALMA_UNASSIGNED_HOLDINGS AMKLP AMXSW AMYLF AMYQR ANMIH AUKKA AXYYD AYJHY CSCUP DNIVK DPUIP EBLON EIOEI ESBYG FERAY FIGPU FINBP FNLPD FRRFC FSGXE FYJPI GGCAI GGRSB GJIRD GQ6 GQ7 GQ8 HG6 HMJXF HQYDN HRMNR I0C IKXTQ IWAJR IXD IZIGR J-C J0Z JBSCW JCJTX JZLTJ KOV LLZTM NPVJJ NQJWS O93 O9J PT4 R89 RLLFE ROL RSV SHX SISQX SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE TSG UG4 UOJIU UTJUX UZXMN VFIZW W48 Z5O Z7R Z7S Z7X Z7Y Z7Z Z83 Z88 ZMTXR ~A9 0R~ AACDK AAJBT AASML AAYXX ABAKF ACDTI AEFQL AFBBN AGRTI AIGIU CITATION SJYHP |
ID | FETCH-LOGICAL-c319t-d904913e2ed894d3ed1f4b1635ef36b68787f8cbb8344e48bbc14b45298cd0773 |
IEDL.DBID | AEJHL |
ISSN | 0975-6809 |
IngestDate | Mon Nov 25 23:57:35 EST 2024 Thu Nov 21 20:37:32 EST 2024 Sun Feb 25 01:23:47 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Keywords | Malicious host identification Cloud computing (CC) Firefly algorithm Classification Principal component analysis |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-d904913e2ed894d3ed1f4b1635ef36b68787f8cbb8344e48bbc14b45298cd0773 |
ORCID | 0000-0002-8799-1542 |
PQID | 2931328558 |
PQPubID | 2043907 |
PageCount | 13 |
ParticipantIDs | proquest_journals_2931328558 crossref_primary_10_1007_s13198_021_01168_x springer_journals_10_1007_s13198_021_01168_x |
PublicationCentury | 2000 |
PublicationDate | 2024-02-01 |
PublicationDateYYYYMMDD | 2024-02-01 |
PublicationDate_xml | – month: 02 year: 2024 text: 2024-02-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New Delhi |
PublicationPlace_xml | – name: New Delhi – name: Dordrecht |
PublicationTitle | International journal of system assurance engineering and management |
PublicationTitleAbbrev | Int J Syst Assur Eng Manag |
PublicationYear | 2024 |
Publisher | Springer India Springer Nature B.V |
Publisher_xml | – name: Springer India – name: Springer Nature B.V |
References | Jiang, Ma, Wei (CR31) 2018; 12 Bi, Jian, Wang, Zhou (CR8) 2016; 7 Manjula, Florence (CR23) 2018; 22 Kaur, Mehta (CR18) 2017; 101 Ruan, Carthy, Kechadi, Baggili (CR36) 2013; 10 Arar, Ayan (CR4) 2015; 33 Ghorbani, Shamshirband, Haghi (CR13) 2017; 172 CR19 CR17 CR39 CR38 Dykstra, Sherman (CR11) 2012; 9 CR37 Cahyani, Martini, Choo, Al-Azhar (CR9) 2017; 29 CR14 Jichao, Yue (CR16) 2015; 8 CR35 Rahman, Hidayah, Cahyani (CR34) 2017; 29 Abdel-Hamid, ElGhamrawy, El Desouky, Arafat (CR1) 2018; 16 Ameer, Lazarescu, Soh (CR3) 2018; 42 Esposito, Castiglione, Martini (CR12) 2016; 3 Pandeeswari, Kumar (CR29) 2016; 21 Pajouh, Dastghaibyfard, Hashemi (CR28) 2017; 48 Bailey, Scheible, Williams (CR5) 2017; 31 Ahmad, Lalitha Bhaskari (CR2) 2016; 85 Planque, Arneberg (CR30) 2017; 75 Owen (CR26) 2014; 1 Pajouh, Javidan, Khayami, Ali, Choo (CR27) 2016; 7 CR6 Ziyan Sheriff, Majdi Mansouri, Karim (CR47) 2017; 54 Kumudha, Venkatesan (CR21) 2016 Martini, Choo (CR24) 2012; 9 CR7 Rahman, Hidayah, Glisson (CR33) 2016; 3 Canali, Lancellotti (CR10) 2014; 29 CR25 CR22 CR43 CR20 CR42 Imran, Aljawarneh, Sakib (CR15) 2016; 22 Rahman, Hidayah, Choo (CR32) 2015; 49 Zawoad, Dutta, Hasan (CR46) 2016; 1 CR40 Wang, Wang, Cui (CR45) 2017; 69 Sood, Mahajan (CR41) 2017; 91 Wang, Zhou, Liu, Jianping, Chen, Xie (CR44) 2016; 11 1168_CR22 1168_CR25 P Ameer (1168_CR3) 2018; 42 1168_CR40 1168_CR43 1168_CR20 1168_CR42 Hu Jichao (1168_CR16) 2015; 8 S Wang (1168_CR44) 2016; 11 S Zawoad (1168_CR46) 2016; 1 SF Bailey (1168_CR5) 2017; 31 HH Pajouh (1168_CR27) 2016; 7 HH Pajouh (1168_CR28) 2017; 48 M Bi (1168_CR8) 2016; 7 MA Ghorbani (1168_CR13) 2017; 172 C Esposito (1168_CR12) 2016; 3 B Martini (1168_CR24) 2012; 9 H Wang (1168_CR45) 2017; 69 P Kumudha (1168_CR21) 2016 Qi Jiang (1168_CR31) 2018; 12 A Imran (1168_CR15) 2016; 22 J-A Owen (1168_CR26) 2014; 1 1168_CR7 A Rahman (1168_CR33) 2016; 3 1168_CR6 NDW Cahyani (1168_CR9) 2017; 29 1168_CR14 1168_CR35 K Ruan (1168_CR36) 2013; 10 N Pandeeswari (1168_CR29) 2016; 21 NB Abdel-Hamid (1168_CR1) 2018; 16 J Dykstra (1168_CR11) 2012; 9 P Kaur (1168_CR18) 2017; 101 C Manjula (1168_CR23) 2018; 22 SK Sood (1168_CR41) 2017; 91 Ab Rahman (1168_CR32) 2015; 49 C Canali (1168_CR10) 2014; 29 1168_CR19 ÖF Arar (1168_CR4) 2015; 33 1168_CR38 B Planque (1168_CR30) 2017; 75 A Rahman (1168_CR34) 2017; 29 1168_CR37 MSK Ahmad (1168_CR2) 2016; 85 1168_CR17 1168_CR39 M Ziyan Sheriff (1168_CR47) 2017; 54 |
References_xml | – volume: 7 start-page: 547 issue: 4 year: 2016 end-page: 554 ident: CR8 article-title: Anomaly detection model of user behavior based on principal component analysis publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-015-0341-4 contributor: fullname: Zhou – volume: 75 start-page: 1021 issue: 3 year: 2017 end-page: 1028 ident: CR30 article-title: Principal component analyses for integrated ecosystem assessments may primarily reflect methodological artefacts publication-title: ICES J Marine Sci doi: 10.1093/icesjms/fsx223 contributor: fullname: Arneberg – volume: 29 start-page: 38 issue: 1 year: 2014 end-page: 52 ident: CR10 article-title: Improving scalability of cloud monitoring through PCA-based clustering of virtual machines publication-title: J Comput Sci Technol doi: 10.1007/s11390-013-1410-9 contributor: fullname: Lancellotti – ident: CR22 – ident: CR43 – volume: 29 start-page: e3855 issue: 14 year: 2017 ident: CR9 article-title: Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study publication-title: Concurr Comput: Pract Exp doi: 10.1002/cpe.3855 contributor: fullname: Al-Azhar – volume: 1 start-page: 2 issue: 1 year: 2014 ident: CR26 article-title: Principal component analysis: data reduction and simplification publication-title: McNair Scholars Res J contributor: fullname: Owen – ident: CR14 – ident: CR39 – ident: CR37 – volume: 8 start-page: 35 issue: 8 year: 2015 end-page: 46 ident: CR16 article-title: Task scheduling model of cloud computing based on firefly algorithm publication-title: Int J Hybrid Inf Technol contributor: fullname: Yue – volume: 48 start-page: 61 issue: 1 year: 2017 end-page: 74 ident: CR28 article-title: Two-tier network anomaly detection model: a machine learning approach publication-title: J Intell Inf Syst doi: 10.1007/s10844-015-0388-x contributor: fullname: Hashemi – volume: 11 start-page: 1265 issue: 6 year: 2016 end-page: 1277 ident: CR44 article-title: An efficient file hierarchy attribute-based encryption scheme in cloud computing publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2016.2523941 contributor: fullname: Xie – volume: 1 start-page: 1 year: 2016 end-page: 1 ident: CR46 article-title: Towards building forensics enabled cloud through secure logging-as-a-service publication-title: IEEE Trans Dependable Secure Comput contributor: fullname: Hasan – volume: 3 start-page: 16 issue: 4 year: 2016 end-page: 22 ident: CR12 article-title: Cloud manufacturing: security, privacy, and forensic concerns publication-title: IEEE Cloud Comput doi: 10.1109/MCC.2016.79 contributor: fullname: Martini – volume: 22 start-page: 494 issue: 4 year: 2016 end-page: 520 ident: CR15 article-title: web data amalgamation for security engineering: digital forensic investigation of open source cloud publication-title: J UCS contributor: fullname: Sakib – ident: CR35 – volume: 33 start-page: 263 year: 2015 end-page: 277 ident: CR4 article-title: Software defect prediction using cost-sensitive neural network publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2015.04.045 contributor: fullname: Ayan – ident: CR6 – volume: 69 start-page: 805 year: 2017 end-page: 815 ident: CR45 article-title: A hybrid multi-objective firefly algorithm for big data optimization publication-title: Appl Soft Comput doi: 10.1007/s00500-015-1817-z contributor: fullname: Cui – ident: CR40 – ident: CR25 – ident: CR42 – volume: 21 start-page: 494 issue: 3 year: 2016 end-page: 505 ident: CR29 article-title: Anomaly detection system in cloud environment using fuzzy clustering based ANN publication-title: Mobile Netw Appl doi: 10.1007/s11036-015-0644-x contributor: fullname: Kumar – volume: 54 start-page: 47 year: 2017 end-page: 64 ident: CR47 article-title: Fault detection using multiscale PCA-based moving window GLRT publication-title: J Process Control doi: 10.1016/j.jprocont.2017.03.004 contributor: fullname: Karim – volume: 101 start-page: 41 year: 2017 end-page: 50 ident: CR18 article-title: Resource provisioning and work flow scheduling in clouds using augmented Shuffled Frog Leaping Algorithm publication-title: J Parallel Distrib Comput doi: 10.1016/j.jpdc.2016.11.003 contributor: fullname: Mehta – volume: 31 start-page: 40 year: 2017 end-page: 47 ident: CR5 article-title: Secure and robust cloud computing for high-throughput forensic microsatellite sequence analysis and databasing publication-title: Forensic Sci Int: Genet doi: 10.1016/j.fsigen.2017.08.008 contributor: fullname: Williams – ident: CR19 – volume: 91 start-page: 33 year: 2017 end-page: 44 ident: CR41 article-title: Wearable IoT sensor based healthcare system for identifying and controlling chikungunya virus publication-title: Comput Ind doi: 10.1016/j.compind.2017.05.006 contributor: fullname: Mahajan – volume: 7 start-page: 314 issue: 2 year: 2016 end-page: 323 ident: CR27 article-title: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks publication-title: IEEE Trans Emerg Topics Comput doi: 10.1109/TETC.2016.2633228 contributor: fullname: Choo – volume: 42 start-page: 18 year: 2018 end-page: 28 ident: CR3 article-title: Towards a practical cloud forensics logging framework publication-title: J Inf Secur Appl contributor: fullname: Soh – year: 2016 ident: CR21 article-title: Cost-sensitive radial basis function neural network classifier for software defect prediction publication-title: Sci World J doi: 10.1155/2016/2401496 contributor: fullname: Venkatesan – ident: CR38 – volume: 85 start-page: 149 year: 2016 end-page: 154 ident: CR2 article-title: Cloud Forensics-A Framework for investigating Cyber Attacks in cloud environment publication-title: Procedia Computer Science doi: 10.1016/j.procs.2016.05.202 contributor: fullname: Lalitha Bhaskari – volume: 49 start-page: 45 year: 2015 end-page: 69 ident: CR32 article-title: A survey of information security incident handling in the cloud publication-title: Comput Secur doi: 10.1016/j.cose.2014.11.006 contributor: fullname: Choo – volume: 3 start-page: 50 issue: 1 year: 2016 end-page: 59 ident: CR33 article-title: Forensic-by-design framework for cyber-physical cloud systems publication-title: IEEE Cloud Comput doi: 10.1109/MCC.2016.5 contributor: fullname: Glisson – ident: CR17 – volume: 9 start-page: 71 issue: 2 year: 2012 end-page: 80 ident: CR24 article-title: An integrated conceptual digital forensic framework for cloud computing publication-title: Digit Investig doi: 10.1016/j.diin.2012.07.001 contributor: fullname: Choo – volume: 172 start-page: 32 year: 2017 end-page: 38 ident: CR13 article-title: Application of firefly algorithm-based support vector machines for prediction of field capacity and permanent wilting point publication-title: Soil Tillage Res doi: 10.1016/j.still.2017.04.009 contributor: fullname: Haghi – volume: 12 start-page: 2039 issue: 2 year: 2018 end-page: 2042 ident: CR31 article-title: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services publication-title: IEEE Syst J doi: 10.1109/JSYST.2016.2574719 contributor: fullname: Wei – volume: 9 start-page: S90 year: 2012 end-page: S98 ident: CR11 article-title: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques publication-title: Digit Investig doi: 10.1016/j.diin.2012.05.001 contributor: fullname: Sherman – ident: CR7 – volume: 29 start-page: e3868 issue: 14 year: 2017 ident: CR34 article-title: Cloud incident handling and forensic-by-design: cloud storage as a case study publication-title: Concurr Comput: Pract Exp doi: 10.1002/cpe.3868 contributor: fullname: Cahyani – volume: 16 start-page: 607 issue: 4 year: 2018 end-page: 626 ident: CR1 article-title: A dynamic spark-based classification framework for imbalanced big data publication-title: J Grid Comput doi: 10.1007/s10723-018-9465-z contributor: fullname: Arafat – volume: 10 start-page: 34 issue: 1 year: 2013 end-page: 43 ident: CR36 article-title: Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results publication-title: Digit Investig doi: 10.1016/j.diin.2013.02.004 contributor: fullname: Baggili – ident: CR20 – volume: 22 start-page: 9847 issue: S4 year: 2018 end-page: 9863 ident: CR23 article-title: Deep neural network based hybrid approach for software defect prediction using software metrics publication-title: Cluster Comput doi: 10.1007/s10586-018-1696-z contributor: fullname: Florence – volume: 29 start-page: 38 issue: 1 year: 2014 ident: 1168_CR10 publication-title: J Comput Sci Technol doi: 10.1007/s11390-013-1410-9 contributor: fullname: C Canali – ident: 1168_CR35 – ident: 1168_CR38 doi: 10.1109/INISTA.2013.6577619 – volume: 1 start-page: 1 year: 2016 ident: 1168_CR46 publication-title: IEEE Trans Dependable Secure Comput contributor: fullname: S Zawoad – volume: 42 start-page: 18 year: 2018 ident: 1168_CR3 publication-title: J Inf Secur Appl contributor: fullname: P Ameer – volume: 29 start-page: e3868 issue: 14 year: 2017 ident: 1168_CR34 publication-title: Concurr Comput: Pract Exp doi: 10.1002/cpe.3868 contributor: fullname: A Rahman – volume: 9 start-page: S90 year: 2012 ident: 1168_CR11 publication-title: Digit Investig doi: 10.1016/j.diin.2012.05.001 contributor: fullname: J Dykstra – volume: 101 start-page: 41 year: 2017 ident: 1168_CR18 publication-title: J Parallel Distrib Comput doi: 10.1016/j.jpdc.2016.11.003 contributor: fullname: P Kaur – volume: 10 start-page: 34 issue: 1 year: 2013 ident: 1168_CR36 publication-title: Digit Investig doi: 10.1016/j.diin.2013.02.004 contributor: fullname: K Ruan – ident: 1168_CR42 doi: 10.1145/3159652.3159736 – ident: 1168_CR39 – volume: 21 start-page: 494 issue: 3 year: 2016 ident: 1168_CR29 publication-title: Mobile Netw Appl doi: 10.1007/s11036-015-0644-x contributor: fullname: N Pandeeswari – ident: 1168_CR6 doi: 10.1109/ICITST.2009.5402561 – volume: 29 start-page: e3855 issue: 14 year: 2017 ident: 1168_CR9 publication-title: Concurr Comput: Pract Exp doi: 10.1002/cpe.3855 contributor: fullname: NDW Cahyani – volume: 9 start-page: 71 issue: 2 year: 2012 ident: 1168_CR24 publication-title: Digit Investig doi: 10.1016/j.diin.2012.07.001 contributor: fullname: B Martini – ident: 1168_CR22 – year: 2016 ident: 1168_CR21 publication-title: Sci World J doi: 10.1155/2016/2401496 contributor: fullname: P Kumudha – volume: 54 start-page: 47 year: 2017 ident: 1168_CR47 publication-title: J Process Control doi: 10.1016/j.jprocont.2017.03.004 contributor: fullname: M Ziyan Sheriff – ident: 1168_CR19 doi: 10.1007/978-3-642-24212-0_3 – volume: 172 start-page: 32 year: 2017 ident: 1168_CR13 publication-title: Soil Tillage Res doi: 10.1016/j.still.2017.04.009 contributor: fullname: MA Ghorbani – ident: 1168_CR43 doi: 10.1109/COMPSAC.2015.173 – ident: 1168_CR37 doi: 10.1109/ISDEA.2012.29 – volume: 7 start-page: 547 issue: 4 year: 2016 ident: 1168_CR8 publication-title: J Ambient Intell Humaniz Comput doi: 10.1007/s12652-015-0341-4 contributor: fullname: M Bi – ident: 1168_CR14 doi: 10.1109/HICSS.2011.386 – volume: 91 start-page: 33 year: 2017 ident: 1168_CR41 publication-title: Comput Ind doi: 10.1016/j.compind.2017.05.006 contributor: fullname: SK Sood – volume: 31 start-page: 40 year: 2017 ident: 1168_CR5 publication-title: Forensic Sci Int: Genet doi: 10.1016/j.fsigen.2017.08.008 contributor: fullname: SF Bailey – volume: 48 start-page: 61 issue: 1 year: 2017 ident: 1168_CR28 publication-title: J Intell Inf Syst doi: 10.1007/s10844-015-0388-x contributor: fullname: HH Pajouh – volume: 33 start-page: 263 year: 2015 ident: 1168_CR4 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2015.04.045 contributor: fullname: ÖF Arar – volume: 75 start-page: 1021 issue: 3 year: 2017 ident: 1168_CR30 publication-title: ICES J Marine Sci doi: 10.1093/icesjms/fsx223 contributor: fullname: B Planque – volume: 16 start-page: 607 issue: 4 year: 2018 ident: 1168_CR1 publication-title: J Grid Comput doi: 10.1007/s10723-018-9465-z contributor: fullname: NB Abdel-Hamid – volume: 1 start-page: 2 issue: 1 year: 2014 ident: 1168_CR26 publication-title: McNair Scholars Res J contributor: fullname: J-A Owen – volume: 22 start-page: 9847 issue: S4 year: 2018 ident: 1168_CR23 publication-title: Cluster Comput doi: 10.1007/s10586-018-1696-z contributor: fullname: C Manjula – volume: 69 start-page: 805 year: 2017 ident: 1168_CR45 publication-title: Appl Soft Comput doi: 10.1007/s00500-015-1817-z contributor: fullname: H Wang – ident: 1168_CR25 doi: 10.14722/ndss.2018.23204 – volume: 22 start-page: 494 issue: 4 year: 2016 ident: 1168_CR15 publication-title: J UCS contributor: fullname: A Imran – volume: 7 start-page: 314 issue: 2 year: 2016 ident: 1168_CR27 publication-title: IEEE Trans Emerg Topics Comput doi: 10.1109/TETC.2016.2633228 contributor: fullname: HH Pajouh – volume: 49 start-page: 45 year: 2015 ident: 1168_CR32 publication-title: Comput Secur doi: 10.1016/j.cose.2014.11.006 contributor: fullname: Ab Rahman – ident: 1168_CR40 doi: 10.1109/FSKD.2017.8393359 – ident: 1168_CR17 doi: 10.1007/978-981-10-3322-3_7 – volume: 3 start-page: 16 issue: 4 year: 2016 ident: 1168_CR12 publication-title: IEEE Cloud Comput doi: 10.1109/MCC.2016.79 contributor: fullname: C Esposito – volume: 12 start-page: 2039 issue: 2 year: 2018 ident: 1168_CR31 publication-title: IEEE Syst J doi: 10.1109/JSYST.2016.2574719 contributor: fullname: Qi Jiang – volume: 11 start-page: 1265 issue: 6 year: 2016 ident: 1168_CR44 publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2016.2523941 contributor: fullname: S Wang – ident: 1168_CR20 doi: 10.1109/SERVICES.2011.91 – ident: 1168_CR7 doi: 10.1109/SADFE.2011.17 – volume: 8 start-page: 35 issue: 8 year: 2015 ident: 1168_CR16 publication-title: Int J Hybrid Inf Technol contributor: fullname: Hu Jichao – volume: 85 start-page: 149 year: 2016 ident: 1168_CR2 publication-title: Procedia Computer Science doi: 10.1016/j.procs.2016.05.202 contributor: fullname: MSK Ahmad – volume: 3 start-page: 50 issue: 1 year: 2016 ident: 1168_CR33 publication-title: IEEE Cloud Comput doi: 10.1109/MCC.2016.5 contributor: fullname: A Rahman |
SSID | ssj0001214240 |
Score | 2.3537958 |
Snippet | The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones,... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Publisher |
StartPage | 578 |
SubjectTerms | Algorithms Artificial neural networks Classification Cloud computing Engineering Engineering Economics Error analysis Error detection Heuristic methods Logistics Machine learning Marketing Neural networks Organization Original Article Performance evaluation Performance measurement Personal computers Principal components analysis Quality Control Reliability Safety and Risk Smartphones Support vector machines |
Title | Malicious host detection and classification in cloud forensics with DNN and SFLO approaches |
URI | https://link.springer.com/article/10.1007/s13198-021-01168-x https://www.proquest.com/docview/2931328558 |
Volume | 15 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60vejBt1itkoM3jXQ3-0iOxbYUqfVQBcHD0rxAhK24LfjznaS7bhU96HU3hDCZZL6Z-WYCcB4aKRE5RFToJKbRVCSU21hRdIYEmkeTWOVCA8NJOn7kvb5rk8M-Qxf5y1WVkfQXdV3rhsrCqWMUuNwBpwgcm2h7YlTuZrd_MxythFZc-ZaProg0pgnviLJc5ueJvpqkGmd-S416izPY_tdad2CrBJiku9SIXVgz-R5srrQd3IenWwTfypFfiavxINrMPSErJ9NcE-XwtCMQ-T0jzzl-mS00QXTryO6qIC52S3rjsR8-GYzuSNWZ3BQH8DDo318PafnIAlW4yDnVAn2EgJnQaC4izYwObCQRpcXGskQmHE-05UpK9yCHibiUKoikS9dypTtpyg6hkc9ycwREBmGqQhtYqUSUhih3xrU0DC2eYdPAtuCiknP2uuylkdVdk53IMhRZ5kWWvbegXW1FVp6rIkNwgu4zj2PegstK9vXv32c7_tvwE9gIEb0s6dltaMzfFuYU1gu9OCu17QO9Yc3j |
link.rule.ids | 315,782,786,27933,27934,41073,42142,48344,48347,49649,49652,52153 |
linkProvider | Springer Nature |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagHYCBN6JQwAMbWGoSJ7HHija0og1Di4TEYNUviSVFpJX4-ZzTRCkIBlgTy7LOZ993d9-dEbr2jZSAHCjhOgoJnfGIMBsqAs4QB_NoIqtcaGAwidNn1uu7Njm0qoUp2O5VSrK4qetiN9AWRhylwCUPGAHk2KQ8oqDLze5wep-sxVZc_VYRXuFxSCLW4WW9zM8TfbVJNdD8lhstTE6y97_F7qPdEmLi7konDtCGyQ7RzlrjwSP0Mgb4rRz9FbsqD6zNoqBkZXiWaawconYUomLX8GsGX-ZLjQHfOrq7yrGL3uJemhbDJ8noEVe9yU1-jJ6S_vRuQMpnFoiCRS6I5uAleIHxjWac6sBoz1IJOC00NohkxOBMW6akdE9yGMqkVB6VLmHLlO7EcXCCGtk8M6cIS8-PlW89KxWnsQ-CD5iWJgCbZ4KZZ1vophK0eFt10xB132QnMgEiE4XIxEcLtau9EOXJygXAE3CgWRiyFrqtZF___n22s78Nv0Jbg-l4JEbD9OEcbfuAZVZk7TZqLN6X5gJt5np5WareJy4l0dM |
linkToPdf | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA7agujBt1itmoM3De2-k2OxLVXrKlRB8BCaF3jZFncL_nwn-3Cr6EG87oYQZibMNzPfTBA6d7UQgBx8wlQYEH_KQkJNIAkEQwzcow6NtKmB0SSKn2l_YMfkfHbx52z3qiRZ9DTYKU1J1pkr06kb38ByKLH0AltIoARQZNOHSAYsvdkb3IzGS3kW28uVp1pYFJCQdlnZO_PzRl_9Uw06v9VJc_cz3Pr_wbfRZgk9ca-wlR20opNdtLE0kHAPvdwBLJeWFott9wdWOsupWgmeJgpLi7QttSjXJn5N4MtsoTDgXkuDlym2WV3cj-N8-WQ4vsfVzHKd7qOn4eDxakTK5xeIhENmRDGIHhxPu1pR5itPK8f4AvBboI0XipDCXTdUCmGf6tA-FUI6vrCFXCpVN4q8A9RIZok-RFg4biRd4xghmR-5oASPKqE98IXamzqmhS4qofN5MWWD1_OUrcg4iIznIuPvLdSu9MLLG5dygC0QWNMgoC10Wemh_v37bkd_W36G1h76Qz6-jm-P0boLEKfgcLdRI3tb6BO0mqrFaWmFH9AV2pY |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Malicious+host+detection+and+classification+in+cloud+forensics+with+DNN+and+SFLO+approaches&rft.jtitle=International+journal+of+system+assurance+engineering+and+management&rft.au=Nandita%2C+G.&rft.au=Munesh+Chandra%2C+T.&rft.date=2024-02-01&rft.pub=Springer+India&rft.issn=0975-6809&rft.eissn=0976-4348&rft.volume=15&rft.issue=2&rft.spage=578&rft.epage=590&rft_id=info:doi/10.1007%2Fs13198-021-01168-x&rft.externalDocID=10_1007_s13198_021_01168_x |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0975-6809&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0975-6809&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0975-6809&client=summon |