Malicious host detection and classification in cloud forensics with DNN and SFLO approaches

The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones, desktop computers, and notebook users. Cloud service enable the authorization practice due to an increasing number of cloud service users. Cloud se...

Full description

Saved in:
Bibliographic Details
Published in:International journal of system assurance engineering and management Vol. 15; no. 2; pp. 578 - 590
Main Authors: Nandita, G., Munesh Chandra, T.
Format: Journal Article
Language:English
Published: New Delhi Springer India 01-02-2024
Springer Nature B.V
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones, desktop computers, and notebook users. Cloud service enable the authorization practice due to an increasing number of cloud service users. Cloud service employs different host to deliver service to the users. But some hosts may be malicious and steal the user’s information or else it provides an unwanted file instead of original files to the user. In previous works, this malicious hosts are identified by site re-routing links, distinguishing file types and so on. The main impact of this malicious host is that it delivers infected data or files to the user or it divert the user to the non-requested data and files. In this paper, we focus on identification and classification of malicious hosts. The host list is examined to extract the features of malicious host by applying firefly algorithm. This identified features are then pre-processed by principal component analysis (PCA) method. The Deep Neural Network based Shuffled Frog Leap Optimization (DNN-SFLO) algorithm is a famous deep learning (DL) approach proposed to test the optimized weights of an identified features. DNN-SFLO accurately detects the malicious host, because the presence of malicious host may affect the cloud service. Performance of DNN-SFLO based host detection is compared with Naïve Bayes, Neural Network (NN), Artificial NN (ANN), Fuzzy C-Means (FCM), Fuzzy k-Nearest Neighbour (FKNN), Support vector machine (SVM). Implementation for this host detection process is carried out in python. The performance metrics taken to evaluate the effectiveness of DNN-SFLO is F-measure, precision, G-mean, sensitivity, error detection probability, and recall
AbstractList The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones, desktop computers, and notebook users. Cloud service enable the authorization practice due to an increasing number of cloud service users. Cloud service employs different host to deliver service to the users. But some hosts may be malicious and steal the user’s information or else it provides an unwanted file instead of original files to the user. In previous works, this malicious hosts are identified by site re-routing links, distinguishing file types and so on. The main impact of this malicious host is that it delivers infected data or files to the user or it divert the user to the non-requested data and files. In this paper, we focus on identification and classification of malicious hosts. The host list is examined to extract the features of malicious host by applying firefly algorithm. This identified features are then pre-processed by principal component analysis (PCA) method. The Deep Neural Network based Shuffled Frog Leap Optimization (DNN-SFLO) algorithm is a famous deep learning (DL) approach proposed to test the optimized weights of an identified features. DNN-SFLO accurately detects the malicious host, because the presence of malicious host may affect the cloud service. Performance of DNN-SFLO based host detection is compared with Naïve Bayes, Neural Network (NN), Artificial NN (ANN), Fuzzy C-Means (FCM), Fuzzy k-Nearest Neighbour (FKNN), Support vector machine (SVM). Implementation for this host detection process is carried out in python. The performance metrics taken to evaluate the effectiveness of DNN-SFLO is F-measure, precision, G-mean, sensitivity, error detection probability, and recall
Author Munesh Chandra, T.
Nandita, G.
Author_xml – sequence: 1
  givenname: G.
  orcidid: 0000-0002-8799-1542
  surname: Nandita
  fullname: Nandita, G.
  email: nandita.goyal@abes.ac.in
  organization: Dr. APJ Abdul, Kalam Technical University
– sequence: 2
  givenname: T.
  surname: Munesh Chandra
  fullname: Munesh Chandra, T.
  organization: Department of Computer Science and Engineering, National Institute of Technology
BookMark eNp9kLtOwzAUhi1UJErpCzBZYg74lsQeUaGAVNoBmBgsx3aoq2IXOxXl7TEJEhvTOTr6L0ffKRj54C0A5xhdYoTqq4QpFrxABBcI44oXhyMwRqKuCkYZH_V7WVQciRMwTWmDEMIEM8LQGLw-qq3TLuwTXIfUQWM7qzsXPFTeQL1VKbnWadWfnM-XsDewDdH65HSCn65bw5vlspc_zRcrqHa7GJRe23QGjlu1TXb6OyfgZX77PLsvFqu7h9n1otD5764wAjGBqSXWcMEMtQa3rMEVLW1Lq6biNa9brpuGU8Ys402jMWtYSQTXBtU1nYCLITcXf-xt6uQm7KPPlZIIiinhZcmzigwqHUNK0bZyF927il8SI_nDUQ4cZeYoe47ykE10MKUs9m82_kX_4_oGu6d3nQ
CitedBy_id crossref_primary_10_1007_s13198_023_02217_3
Cites_doi 10.1007/s12652-015-0341-4
10.1093/icesjms/fsx223
10.1007/s11390-013-1410-9
10.1002/cpe.3855
10.1007/s10844-015-0388-x
10.1109/TIFS.2016.2523941
10.1109/MCC.2016.79
10.1016/j.asoc.2015.04.045
10.1007/s00500-015-1817-z
10.1007/s11036-015-0644-x
10.1016/j.jprocont.2017.03.004
10.1016/j.jpdc.2016.11.003
10.1016/j.fsigen.2017.08.008
10.1016/j.compind.2017.05.006
10.1109/TETC.2016.2633228
10.1155/2016/2401496
10.1016/j.procs.2016.05.202
10.1016/j.cose.2014.11.006
10.1109/MCC.2016.5
10.1016/j.diin.2012.07.001
10.1016/j.still.2017.04.009
10.1109/JSYST.2016.2574719
10.1016/j.diin.2012.05.001
10.1002/cpe.3868
10.1007/s10723-018-9465-z
10.1016/j.diin.2013.02.004
10.1007/s10586-018-1696-z
10.1109/INISTA.2013.6577619
10.1145/3159652.3159736
10.1109/ICITST.2009.5402561
10.1007/978-3-642-24212-0_3
10.1109/COMPSAC.2015.173
10.1109/ISDEA.2012.29
10.1109/HICSS.2011.386
10.14722/ndss.2018.23204
10.1109/FSKD.2017.8393359
10.1007/978-981-10-3322-3_7
10.1109/SERVICES.2011.91
10.1109/SADFE.2011.17
ContentType Journal Article
Copyright The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2021
The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2021.
Copyright_xml – notice: The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2021
– notice: The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2021.
DBID AAYXX
CITATION
DOI 10.1007/s13198-021-01168-x
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 0976-4348
EndPage 590
ExternalDocumentID 10_1007_s13198_021_01168_x
GroupedDBID -EM
06D
203
29~
2JY
30V
406
40D
96X
AAFGU
AAHNG
AAIAL
AAJKR
AANZL
AARHV
AARTL
AATNV
AATVU
AAUYE
AAWCG
AAYFA
AAYIU
AAYQN
AAYTO
AAZMS
ABBXA
ABDZT
ABECU
ABFGW
ABFTV
ABHQN
ABJNI
ABJOX
ABKAS
ABKCH
ABMQK
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBMV
ACBRV
ACBYP
ACGFS
ACHSB
ACIGE
ACIPQ
ACIWK
ACKNC
ACMLO
ACOKC
ACTTH
ACVWB
ACWMK
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMDM
ADOXG
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFTE
AEGNC
AEJHL
AEJRE
AEMSY
AEOHA
AEPYU
AESKC
AESTI
AETCA
AEVLU
AEVTX
AEXYK
AFLOW
AFNRJ
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGBP
AGJBK
AGMZJ
AGQEE
AGQMX
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AIMYW
AITGF
AJBLW
AJDOV
AJZVZ
AKLTO
AKQUC
ALFXC
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMXSW
AMYLF
AMYQR
ANMIH
AUKKA
AXYYD
AYJHY
CSCUP
DNIVK
DPUIP
EBLON
EIOEI
ESBYG
FERAY
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FYJPI
GGCAI
GGRSB
GJIRD
GQ6
GQ7
GQ8
HG6
HMJXF
HQYDN
HRMNR
I0C
IKXTQ
IWAJR
IXD
IZIGR
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KOV
LLZTM
NPVJJ
NQJWS
O93
O9J
PT4
R89
RLLFE
ROL
RSV
SHX
SISQX
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
TSG
UG4
UOJIU
UTJUX
UZXMN
VFIZW
W48
Z5O
Z7R
Z7S
Z7X
Z7Y
Z7Z
Z83
Z88
ZMTXR
~A9
0R~
AACDK
AAJBT
AASML
AAYXX
ABAKF
ACDTI
AEFQL
AFBBN
AGRTI
AIGIU
CITATION
SJYHP
ID FETCH-LOGICAL-c319t-d904913e2ed894d3ed1f4b1635ef36b68787f8cbb8344e48bbc14b45298cd0773
IEDL.DBID AEJHL
ISSN 0975-6809
IngestDate Mon Nov 25 23:57:35 EST 2024
Thu Nov 21 20:37:32 EST 2024
Sun Feb 25 01:23:47 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Malicious host identification
Cloud computing (CC)
Firefly algorithm
Classification
Principal component analysis
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-d904913e2ed894d3ed1f4b1635ef36b68787f8cbb8344e48bbc14b45298cd0773
ORCID 0000-0002-8799-1542
PQID 2931328558
PQPubID 2043907
PageCount 13
ParticipantIDs proquest_journals_2931328558
crossref_primary_10_1007_s13198_021_01168_x
springer_journals_10_1007_s13198_021_01168_x
PublicationCentury 2000
PublicationDate 2024-02-01
PublicationDateYYYYMMDD 2024-02-01
PublicationDate_xml – month: 02
  year: 2024
  text: 2024-02-01
  day: 01
PublicationDecade 2020
PublicationPlace New Delhi
PublicationPlace_xml – name: New Delhi
– name: Dordrecht
PublicationTitle International journal of system assurance engineering and management
PublicationTitleAbbrev Int J Syst Assur Eng Manag
PublicationYear 2024
Publisher Springer India
Springer Nature B.V
Publisher_xml – name: Springer India
– name: Springer Nature B.V
References Jiang, Ma, Wei (CR31) 2018; 12
Bi, Jian, Wang, Zhou (CR8) 2016; 7
Manjula, Florence (CR23) 2018; 22
Kaur, Mehta (CR18) 2017; 101
Ruan, Carthy, Kechadi, Baggili (CR36) 2013; 10
Arar, Ayan (CR4) 2015; 33
Ghorbani, Shamshirband, Haghi (CR13) 2017; 172
CR19
CR17
CR39
CR38
Dykstra, Sherman (CR11) 2012; 9
CR37
Cahyani, Martini, Choo, Al-Azhar (CR9) 2017; 29
CR14
Jichao, Yue (CR16) 2015; 8
CR35
Rahman, Hidayah, Cahyani (CR34) 2017; 29
Abdel-Hamid, ElGhamrawy, El Desouky, Arafat (CR1) 2018; 16
Ameer, Lazarescu, Soh (CR3) 2018; 42
Esposito, Castiglione, Martini (CR12) 2016; 3
Pandeeswari, Kumar (CR29) 2016; 21
Pajouh, Dastghaibyfard, Hashemi (CR28) 2017; 48
Bailey, Scheible, Williams (CR5) 2017; 31
Ahmad, Lalitha Bhaskari (CR2) 2016; 85
Planque, Arneberg (CR30) 2017; 75
Owen (CR26) 2014; 1
Pajouh, Javidan, Khayami, Ali, Choo (CR27) 2016; 7
CR6
Ziyan Sheriff, Majdi Mansouri, Karim (CR47) 2017; 54
Kumudha, Venkatesan (CR21) 2016
Martini, Choo (CR24) 2012; 9
CR7
Rahman, Hidayah, Glisson (CR33) 2016; 3
Canali, Lancellotti (CR10) 2014; 29
CR25
CR22
CR43
CR20
CR42
Imran, Aljawarneh, Sakib (CR15) 2016; 22
Rahman, Hidayah, Choo (CR32) 2015; 49
Zawoad, Dutta, Hasan (CR46) 2016; 1
CR40
Wang, Wang, Cui (CR45) 2017; 69
Sood, Mahajan (CR41) 2017; 91
Wang, Zhou, Liu, Jianping, Chen, Xie (CR44) 2016; 11
1168_CR22
1168_CR25
P Ameer (1168_CR3) 2018; 42
1168_CR40
1168_CR43
1168_CR20
1168_CR42
Hu Jichao (1168_CR16) 2015; 8
S Wang (1168_CR44) 2016; 11
S Zawoad (1168_CR46) 2016; 1
SF Bailey (1168_CR5) 2017; 31
HH Pajouh (1168_CR27) 2016; 7
HH Pajouh (1168_CR28) 2017; 48
M Bi (1168_CR8) 2016; 7
MA Ghorbani (1168_CR13) 2017; 172
C Esposito (1168_CR12) 2016; 3
B Martini (1168_CR24) 2012; 9
H Wang (1168_CR45) 2017; 69
P Kumudha (1168_CR21) 2016
Qi Jiang (1168_CR31) 2018; 12
A Imran (1168_CR15) 2016; 22
J-A Owen (1168_CR26) 2014; 1
1168_CR7
A Rahman (1168_CR33) 2016; 3
1168_CR6
NDW Cahyani (1168_CR9) 2017; 29
1168_CR14
1168_CR35
K Ruan (1168_CR36) 2013; 10
N Pandeeswari (1168_CR29) 2016; 21
NB Abdel-Hamid (1168_CR1) 2018; 16
J Dykstra (1168_CR11) 2012; 9
P Kaur (1168_CR18) 2017; 101
C Manjula (1168_CR23) 2018; 22
SK Sood (1168_CR41) 2017; 91
Ab Rahman (1168_CR32) 2015; 49
C Canali (1168_CR10) 2014; 29
1168_CR19
ÖF Arar (1168_CR4) 2015; 33
1168_CR38
B Planque (1168_CR30) 2017; 75
A Rahman (1168_CR34) 2017; 29
1168_CR37
MSK Ahmad (1168_CR2) 2016; 85
1168_CR17
1168_CR39
M Ziyan Sheriff (1168_CR47) 2017; 54
References_xml – volume: 7
  start-page: 547
  issue: 4
  year: 2016
  end-page: 554
  ident: CR8
  article-title: Anomaly detection model of user behavior based on principal component analysis
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-015-0341-4
  contributor:
    fullname: Zhou
– volume: 75
  start-page: 1021
  issue: 3
  year: 2017
  end-page: 1028
  ident: CR30
  article-title: Principal component analyses for integrated ecosystem assessments may primarily reflect methodological artefacts
  publication-title: ICES J Marine Sci
  doi: 10.1093/icesjms/fsx223
  contributor:
    fullname: Arneberg
– volume: 29
  start-page: 38
  issue: 1
  year: 2014
  end-page: 52
  ident: CR10
  article-title: Improving scalability of cloud monitoring through PCA-based clustering of virtual machines
  publication-title: J Comput Sci Technol
  doi: 10.1007/s11390-013-1410-9
  contributor:
    fullname: Lancellotti
– ident: CR22
– ident: CR43
– volume: 29
  start-page: e3855
  issue: 14
  year: 2017
  ident: CR9
  article-title: Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study
  publication-title: Concurr Comput: Pract Exp
  doi: 10.1002/cpe.3855
  contributor:
    fullname: Al-Azhar
– volume: 1
  start-page: 2
  issue: 1
  year: 2014
  ident: CR26
  article-title: Principal component analysis: data reduction and simplification
  publication-title: McNair Scholars Res J
  contributor:
    fullname: Owen
– ident: CR14
– ident: CR39
– ident: CR37
– volume: 8
  start-page: 35
  issue: 8
  year: 2015
  end-page: 46
  ident: CR16
  article-title: Task scheduling model of cloud computing based on firefly algorithm
  publication-title: Int J Hybrid Inf Technol
  contributor:
    fullname: Yue
– volume: 48
  start-page: 61
  issue: 1
  year: 2017
  end-page: 74
  ident: CR28
  article-title: Two-tier network anomaly detection model: a machine learning approach
  publication-title: J Intell Inf Syst
  doi: 10.1007/s10844-015-0388-x
  contributor:
    fullname: Hashemi
– volume: 11
  start-page: 1265
  issue: 6
  year: 2016
  end-page: 1277
  ident: CR44
  article-title: An efficient file hierarchy attribute-based encryption scheme in cloud computing
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2016.2523941
  contributor:
    fullname: Xie
– volume: 1
  start-page: 1
  year: 2016
  end-page: 1
  ident: CR46
  article-title: Towards building forensics enabled cloud through secure logging-as-a-service
  publication-title: IEEE Trans Dependable Secure Comput
  contributor:
    fullname: Hasan
– volume: 3
  start-page: 16
  issue: 4
  year: 2016
  end-page: 22
  ident: CR12
  article-title: Cloud manufacturing: security, privacy, and forensic concerns
  publication-title: IEEE Cloud Comput
  doi: 10.1109/MCC.2016.79
  contributor:
    fullname: Martini
– volume: 22
  start-page: 494
  issue: 4
  year: 2016
  end-page: 520
  ident: CR15
  article-title: web data amalgamation for security engineering: digital forensic investigation of open source cloud
  publication-title: J UCS
  contributor:
    fullname: Sakib
– ident: CR35
– volume: 33
  start-page: 263
  year: 2015
  end-page: 277
  ident: CR4
  article-title: Software defect prediction using cost-sensitive neural network
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2015.04.045
  contributor:
    fullname: Ayan
– ident: CR6
– volume: 69
  start-page: 805
  year: 2017
  end-page: 815
  ident: CR45
  article-title: A hybrid multi-objective firefly algorithm for big data optimization
  publication-title: Appl Soft Comput
  doi: 10.1007/s00500-015-1817-z
  contributor:
    fullname: Cui
– ident: CR40
– ident: CR25
– ident: CR42
– volume: 21
  start-page: 494
  issue: 3
  year: 2016
  end-page: 505
  ident: CR29
  article-title: Anomaly detection system in cloud environment using fuzzy clustering based ANN
  publication-title: Mobile Netw Appl
  doi: 10.1007/s11036-015-0644-x
  contributor:
    fullname: Kumar
– volume: 54
  start-page: 47
  year: 2017
  end-page: 64
  ident: CR47
  article-title: Fault detection using multiscale PCA-based moving window GLRT
  publication-title: J Process Control
  doi: 10.1016/j.jprocont.2017.03.004
  contributor:
    fullname: Karim
– volume: 101
  start-page: 41
  year: 2017
  end-page: 50
  ident: CR18
  article-title: Resource provisioning and work flow scheduling in clouds using augmented Shuffled Frog Leaping Algorithm
  publication-title: J Parallel Distrib Comput
  doi: 10.1016/j.jpdc.2016.11.003
  contributor:
    fullname: Mehta
– volume: 31
  start-page: 40
  year: 2017
  end-page: 47
  ident: CR5
  article-title: Secure and robust cloud computing for high-throughput forensic microsatellite sequence analysis and databasing
  publication-title: Forensic Sci Int: Genet
  doi: 10.1016/j.fsigen.2017.08.008
  contributor:
    fullname: Williams
– ident: CR19
– volume: 91
  start-page: 33
  year: 2017
  end-page: 44
  ident: CR41
  article-title: Wearable IoT sensor based healthcare system for identifying and controlling chikungunya virus
  publication-title: Comput Ind
  doi: 10.1016/j.compind.2017.05.006
  contributor:
    fullname: Mahajan
– volume: 7
  start-page: 314
  issue: 2
  year: 2016
  end-page: 323
  ident: CR27
  article-title: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
  publication-title: IEEE Trans Emerg Topics Comput
  doi: 10.1109/TETC.2016.2633228
  contributor:
    fullname: Choo
– volume: 42
  start-page: 18
  year: 2018
  end-page: 28
  ident: CR3
  article-title: Towards a practical cloud forensics logging framework
  publication-title: J Inf Secur Appl
  contributor:
    fullname: Soh
– year: 2016
  ident: CR21
  article-title: Cost-sensitive radial basis function neural network classifier for software defect prediction
  publication-title: Sci World J
  doi: 10.1155/2016/2401496
  contributor:
    fullname: Venkatesan
– ident: CR38
– volume: 85
  start-page: 149
  year: 2016
  end-page: 154
  ident: CR2
  article-title: Cloud Forensics-A Framework for investigating Cyber Attacks in cloud environment
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2016.05.202
  contributor:
    fullname: Lalitha Bhaskari
– volume: 49
  start-page: 45
  year: 2015
  end-page: 69
  ident: CR32
  article-title: A survey of information security incident handling in the cloud
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2014.11.006
  contributor:
    fullname: Choo
– volume: 3
  start-page: 50
  issue: 1
  year: 2016
  end-page: 59
  ident: CR33
  article-title: Forensic-by-design framework for cyber-physical cloud systems
  publication-title: IEEE Cloud Comput
  doi: 10.1109/MCC.2016.5
  contributor:
    fullname: Glisson
– ident: CR17
– volume: 9
  start-page: 71
  issue: 2
  year: 2012
  end-page: 80
  ident: CR24
  article-title: An integrated conceptual digital forensic framework for cloud computing
  publication-title: Digit Investig
  doi: 10.1016/j.diin.2012.07.001
  contributor:
    fullname: Choo
– volume: 172
  start-page: 32
  year: 2017
  end-page: 38
  ident: CR13
  article-title: Application of firefly algorithm-based support vector machines for prediction of field capacity and permanent wilting point
  publication-title: Soil Tillage Res
  doi: 10.1016/j.still.2017.04.009
  contributor:
    fullname: Haghi
– volume: 12
  start-page: 2039
  issue: 2
  year: 2018
  end-page: 2042
  ident: CR31
  article-title: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services
  publication-title: IEEE Syst J
  doi: 10.1109/JSYST.2016.2574719
  contributor:
    fullname: Wei
– volume: 9
  start-page: S90
  year: 2012
  end-page: S98
  ident: CR11
  article-title: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
  publication-title: Digit Investig
  doi: 10.1016/j.diin.2012.05.001
  contributor:
    fullname: Sherman
– ident: CR7
– volume: 29
  start-page: e3868
  issue: 14
  year: 2017
  ident: CR34
  article-title: Cloud incident handling and forensic-by-design: cloud storage as a case study
  publication-title: Concurr Comput: Pract Exp
  doi: 10.1002/cpe.3868
  contributor:
    fullname: Cahyani
– volume: 16
  start-page: 607
  issue: 4
  year: 2018
  end-page: 626
  ident: CR1
  article-title: A dynamic spark-based classification framework for imbalanced big data
  publication-title: J Grid Comput
  doi: 10.1007/s10723-018-9465-z
  contributor:
    fullname: Arafat
– volume: 10
  start-page: 34
  issue: 1
  year: 2013
  end-page: 43
  ident: CR36
  article-title: Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
  publication-title: Digit Investig
  doi: 10.1016/j.diin.2013.02.004
  contributor:
    fullname: Baggili
– ident: CR20
– volume: 22
  start-page: 9847
  issue: S4
  year: 2018
  end-page: 9863
  ident: CR23
  article-title: Deep neural network based hybrid approach for software defect prediction using software metrics
  publication-title: Cluster Comput
  doi: 10.1007/s10586-018-1696-z
  contributor:
    fullname: Florence
– volume: 29
  start-page: 38
  issue: 1
  year: 2014
  ident: 1168_CR10
  publication-title: J Comput Sci Technol
  doi: 10.1007/s11390-013-1410-9
  contributor:
    fullname: C Canali
– ident: 1168_CR35
– ident: 1168_CR38
  doi: 10.1109/INISTA.2013.6577619
– volume: 1
  start-page: 1
  year: 2016
  ident: 1168_CR46
  publication-title: IEEE Trans Dependable Secure Comput
  contributor:
    fullname: S Zawoad
– volume: 42
  start-page: 18
  year: 2018
  ident: 1168_CR3
  publication-title: J Inf Secur Appl
  contributor:
    fullname: P Ameer
– volume: 29
  start-page: e3868
  issue: 14
  year: 2017
  ident: 1168_CR34
  publication-title: Concurr Comput: Pract Exp
  doi: 10.1002/cpe.3868
  contributor:
    fullname: A Rahman
– volume: 9
  start-page: S90
  year: 2012
  ident: 1168_CR11
  publication-title: Digit Investig
  doi: 10.1016/j.diin.2012.05.001
  contributor:
    fullname: J Dykstra
– volume: 101
  start-page: 41
  year: 2017
  ident: 1168_CR18
  publication-title: J Parallel Distrib Comput
  doi: 10.1016/j.jpdc.2016.11.003
  contributor:
    fullname: P Kaur
– volume: 10
  start-page: 34
  issue: 1
  year: 2013
  ident: 1168_CR36
  publication-title: Digit Investig
  doi: 10.1016/j.diin.2013.02.004
  contributor:
    fullname: K Ruan
– ident: 1168_CR42
  doi: 10.1145/3159652.3159736
– ident: 1168_CR39
– volume: 21
  start-page: 494
  issue: 3
  year: 2016
  ident: 1168_CR29
  publication-title: Mobile Netw Appl
  doi: 10.1007/s11036-015-0644-x
  contributor:
    fullname: N Pandeeswari
– ident: 1168_CR6
  doi: 10.1109/ICITST.2009.5402561
– volume: 29
  start-page: e3855
  issue: 14
  year: 2017
  ident: 1168_CR9
  publication-title: Concurr Comput: Pract Exp
  doi: 10.1002/cpe.3855
  contributor:
    fullname: NDW Cahyani
– volume: 9
  start-page: 71
  issue: 2
  year: 2012
  ident: 1168_CR24
  publication-title: Digit Investig
  doi: 10.1016/j.diin.2012.07.001
  contributor:
    fullname: B Martini
– ident: 1168_CR22
– year: 2016
  ident: 1168_CR21
  publication-title: Sci World J
  doi: 10.1155/2016/2401496
  contributor:
    fullname: P Kumudha
– volume: 54
  start-page: 47
  year: 2017
  ident: 1168_CR47
  publication-title: J Process Control
  doi: 10.1016/j.jprocont.2017.03.004
  contributor:
    fullname: M Ziyan Sheriff
– ident: 1168_CR19
  doi: 10.1007/978-3-642-24212-0_3
– volume: 172
  start-page: 32
  year: 2017
  ident: 1168_CR13
  publication-title: Soil Tillage Res
  doi: 10.1016/j.still.2017.04.009
  contributor:
    fullname: MA Ghorbani
– ident: 1168_CR43
  doi: 10.1109/COMPSAC.2015.173
– ident: 1168_CR37
  doi: 10.1109/ISDEA.2012.29
– volume: 7
  start-page: 547
  issue: 4
  year: 2016
  ident: 1168_CR8
  publication-title: J Ambient Intell Humaniz Comput
  doi: 10.1007/s12652-015-0341-4
  contributor:
    fullname: M Bi
– ident: 1168_CR14
  doi: 10.1109/HICSS.2011.386
– volume: 91
  start-page: 33
  year: 2017
  ident: 1168_CR41
  publication-title: Comput Ind
  doi: 10.1016/j.compind.2017.05.006
  contributor:
    fullname: SK Sood
– volume: 31
  start-page: 40
  year: 2017
  ident: 1168_CR5
  publication-title: Forensic Sci Int: Genet
  doi: 10.1016/j.fsigen.2017.08.008
  contributor:
    fullname: SF Bailey
– volume: 48
  start-page: 61
  issue: 1
  year: 2017
  ident: 1168_CR28
  publication-title: J Intell Inf Syst
  doi: 10.1007/s10844-015-0388-x
  contributor:
    fullname: HH Pajouh
– volume: 33
  start-page: 263
  year: 2015
  ident: 1168_CR4
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2015.04.045
  contributor:
    fullname: ÖF Arar
– volume: 75
  start-page: 1021
  issue: 3
  year: 2017
  ident: 1168_CR30
  publication-title: ICES J Marine Sci
  doi: 10.1093/icesjms/fsx223
  contributor:
    fullname: B Planque
– volume: 16
  start-page: 607
  issue: 4
  year: 2018
  ident: 1168_CR1
  publication-title: J Grid Comput
  doi: 10.1007/s10723-018-9465-z
  contributor:
    fullname: NB Abdel-Hamid
– volume: 1
  start-page: 2
  issue: 1
  year: 2014
  ident: 1168_CR26
  publication-title: McNair Scholars Res J
  contributor:
    fullname: J-A Owen
– volume: 22
  start-page: 9847
  issue: S4
  year: 2018
  ident: 1168_CR23
  publication-title: Cluster Comput
  doi: 10.1007/s10586-018-1696-z
  contributor:
    fullname: C Manjula
– volume: 69
  start-page: 805
  year: 2017
  ident: 1168_CR45
  publication-title: Appl Soft Comput
  doi: 10.1007/s00500-015-1817-z
  contributor:
    fullname: H Wang
– ident: 1168_CR25
  doi: 10.14722/ndss.2018.23204
– volume: 22
  start-page: 494
  issue: 4
  year: 2016
  ident: 1168_CR15
  publication-title: J UCS
  contributor:
    fullname: A Imran
– volume: 7
  start-page: 314
  issue: 2
  year: 2016
  ident: 1168_CR27
  publication-title: IEEE Trans Emerg Topics Comput
  doi: 10.1109/TETC.2016.2633228
  contributor:
    fullname: HH Pajouh
– volume: 49
  start-page: 45
  year: 2015
  ident: 1168_CR32
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2014.11.006
  contributor:
    fullname: Ab Rahman
– ident: 1168_CR40
  doi: 10.1109/FSKD.2017.8393359
– ident: 1168_CR17
  doi: 10.1007/978-981-10-3322-3_7
– volume: 3
  start-page: 16
  issue: 4
  year: 2016
  ident: 1168_CR12
  publication-title: IEEE Cloud Comput
  doi: 10.1109/MCC.2016.79
  contributor:
    fullname: C Esposito
– volume: 12
  start-page: 2039
  issue: 2
  year: 2018
  ident: 1168_CR31
  publication-title: IEEE Syst J
  doi: 10.1109/JSYST.2016.2574719
  contributor:
    fullname: Qi Jiang
– volume: 11
  start-page: 1265
  issue: 6
  year: 2016
  ident: 1168_CR44
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2016.2523941
  contributor:
    fullname: S Wang
– ident: 1168_CR20
  doi: 10.1109/SERVICES.2011.91
– ident: 1168_CR7
  doi: 10.1109/SADFE.2011.17
– volume: 8
  start-page: 35
  issue: 8
  year: 2015
  ident: 1168_CR16
  publication-title: Int J Hybrid Inf Technol
  contributor:
    fullname: Hu Jichao
– volume: 85
  start-page: 149
  year: 2016
  ident: 1168_CR2
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2016.05.202
  contributor:
    fullname: MSK Ahmad
– volume: 3
  start-page: 50
  issue: 1
  year: 2016
  ident: 1168_CR33
  publication-title: IEEE Cloud Comput
  doi: 10.1109/MCC.2016.5
  contributor:
    fullname: A Rahman
SSID ssj0001214240
Score 2.3537958
Snippet The rate of using cloud service is increased in recent years. The service provided by cloud computing (CC) is pre-owned by various laptops, smartphones,...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Publisher
StartPage 578
SubjectTerms Algorithms
Artificial neural networks
Classification
Cloud computing
Engineering
Engineering Economics
Error analysis
Error detection
Heuristic methods
Logistics
Machine learning
Marketing
Neural networks
Organization
Original Article
Performance evaluation
Performance measurement
Personal computers
Principal components analysis
Quality Control
Reliability
Safety and Risk
Smartphones
Support vector machines
Title Malicious host detection and classification in cloud forensics with DNN and SFLO approaches
URI https://link.springer.com/article/10.1007/s13198-021-01168-x
https://www.proquest.com/docview/2931328558
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60vejBt1itkoM3jXQ3-0iOxbYUqfVQBcHD0rxAhK24LfjznaS7bhU96HU3hDCZZL6Z-WYCcB4aKRE5RFToJKbRVCSU21hRdIYEmkeTWOVCA8NJOn7kvb5rk8M-Qxf5y1WVkfQXdV3rhsrCqWMUuNwBpwgcm2h7YlTuZrd_MxythFZc-ZaProg0pgnviLJc5ueJvpqkGmd-S416izPY_tdad2CrBJiku9SIXVgz-R5srrQd3IenWwTfypFfiavxINrMPSErJ9NcE-XwtCMQ-T0jzzl-mS00QXTryO6qIC52S3rjsR8-GYzuSNWZ3BQH8DDo318PafnIAlW4yDnVAn2EgJnQaC4izYwObCQRpcXGskQmHE-05UpK9yCHibiUKoikS9dypTtpyg6hkc9ycwREBmGqQhtYqUSUhih3xrU0DC2eYdPAtuCiknP2uuylkdVdk53IMhRZ5kWWvbegXW1FVp6rIkNwgu4zj2PegstK9vXv32c7_tvwE9gIEb0s6dltaMzfFuYU1gu9OCu17QO9Yc3j
link.rule.ids 315,782,786,27933,27934,41073,42142,48344,48347,49649,49652,52153
linkProvider Springer Nature
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagHYCBN6JQwAMbWGoSJ7HHija0og1Di4TEYNUviSVFpJX4-ZzTRCkIBlgTy7LOZ993d9-dEbr2jZSAHCjhOgoJnfGIMBsqAs4QB_NoIqtcaGAwidNn1uu7Njm0qoUp2O5VSrK4qetiN9AWRhylwCUPGAHk2KQ8oqDLze5wep-sxVZc_VYRXuFxSCLW4WW9zM8TfbVJNdD8lhstTE6y97_F7qPdEmLi7konDtCGyQ7RzlrjwSP0Mgb4rRz9FbsqD6zNoqBkZXiWaawconYUomLX8GsGX-ZLjQHfOrq7yrGL3uJemhbDJ8noEVe9yU1-jJ6S_vRuQMpnFoiCRS6I5uAleIHxjWac6sBoz1IJOC00NohkxOBMW6akdE9yGMqkVB6VLmHLlO7EcXCCGtk8M6cIS8-PlW89KxWnsQ-CD5iWJgCbZ4KZZ1vophK0eFt10xB132QnMgEiE4XIxEcLtau9EOXJygXAE3CgWRiyFrqtZF___n22s78Nv0Jbg-l4JEbD9OEcbfuAZVZk7TZqLN6X5gJt5np5WareJy4l0dM
linkToPdf http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA7agujBt1itmoM3De2-k2OxLVXrKlRB8BCaF3jZFncL_nwn-3Cr6EG87oYQZibMNzPfTBA6d7UQgBx8wlQYEH_KQkJNIAkEQwzcow6NtKmB0SSKn2l_YMfkfHbx52z3qiRZ9DTYKU1J1pkr06kb38ByKLH0AltIoARQZNOHSAYsvdkb3IzGS3kW28uVp1pYFJCQdlnZO_PzRl_9Uw06v9VJc_cz3Pr_wbfRZgk9ca-wlR20opNdtLE0kHAPvdwBLJeWFott9wdWOsupWgmeJgpLi7QttSjXJn5N4MtsoTDgXkuDlym2WV3cj-N8-WQ4vsfVzHKd7qOn4eDxakTK5xeIhENmRDGIHhxPu1pR5itPK8f4AvBboI0XipDCXTdUCmGf6tA-FUI6vrCFXCpVN4q8A9RIZok-RFg4biRd4xghmR-5oASPKqE98IXamzqmhS4qofN5MWWD1_OUrcg4iIznIuPvLdSu9MLLG5dygC0QWNMgoC10Wemh_v37bkd_W36G1h76Qz6-jm-P0boLEKfgcLdRI3tb6BO0mqrFaWmFH9AV2pY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Malicious+host+detection+and+classification+in+cloud+forensics+with+DNN+and+SFLO+approaches&rft.jtitle=International+journal+of+system+assurance+engineering+and+management&rft.au=Nandita%2C+G.&rft.au=Munesh+Chandra%2C+T.&rft.date=2024-02-01&rft.pub=Springer+India&rft.issn=0975-6809&rft.eissn=0976-4348&rft.volume=15&rft.issue=2&rft.spage=578&rft.epage=590&rft_id=info:doi/10.1007%2Fs13198-021-01168-x&rft.externalDocID=10_1007_s13198_021_01168_x
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0975-6809&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0975-6809&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0975-6809&client=summon