M. Ali, S. U. Khan, and A. V. Vasilakos, Security in cloud computing: Opportunities and challenges, Information Sciences, vol. 35, pp. 357–383, 2015.
A. Singh and K. Chatterjee, Cloud security issues and challenges: A survey, Journal of Network and Computer Applications, vol. 79, pp. 88–115, 2017.
P. S. Gowr and N. Kumar, Cloud computing security: A survey, International Journal of Engineering and Technology, vol. 7, no. 2, pp. 355–357, 2018.
A. Verma and S. Kaushal, Cloud computing security issues and challenges: A survey, in Proc. First International Conference on Advances in Computing and Communications, Kochi, India, 2011, pp. 445–454.
H. Alloussi, F. Laila, and A. Sekkaki, L’état de l’art de la sécurité dans le cloud computing: Problèmes et solutions de la sécurité en cloud computing, presented at Workshop on Innovation and New Trends in Information Systems, Mohamadia, Maroc, 2012.
J. Gu, L. Wang, H. Wang, and S. Wang, A novel approach to intrusion detection using SVM ensemble with feature augmentation, Computers and Security, vol. 86, pp. 53–62, 2019.
Z. Chiba, N. Abghour, K. Moussaid, A. E. Omri, and M. Rida, A cooperative and hybrid network intrusion detection framework in cloud computing based snort and optimized back propagation neural network, Procedia Computer Science, vol. 83, pp. 1200–1206, 2016.
A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, Survey of intrusion detection systems: Techniques, datasets and challenges, Cybersecurity, vol. 2, p. 20, 2019.
A. Guezzaz, A. Asimi, Y. Asimi, Z. Tbatou, and Y. Sadqi, A global intrusion detection system using PcapSockS sniffer and multilayer perceptron classifier, International Journal of Network Security, vol. 21, no. 3, pp. 438–450, 2019.
A. Guezzaz, S. Benkirane, M. Azrour, and S. Khurram, A reliable network intrusion detection approach using decision tree with enhanced data quality, Security and Communication Networks, vol. 2021, p. 1230593, 2021.
B. A. Tama and K. H. Rhee, HFSTE: Hybrid feature selections and tree-based classifiers ensemble for intrusion detection system, IEICE Trans. Inf. Syst., vol. E100.D, no. 8, pp. 1729–1737, 2017.
M. Azrour, J. Mabrouki, G. Fattah, A. Guezzaz, and F. Aziz, Machine learning algorithms for efficient water quality prediction, Modeling Earth Systems and Environment, vol. 8, pp. 2793–2801, 2022.
M. Azrour, Y. Farhaoui, M. Ouanan, and A. Guezzaz, SPIT detection in telephony over IP using K-means algorithm, Procedia Computer Science, vol. 148, pp. 542–551, 2019.
M. Azrour, M. Ouanan, Y. Farhaoui, and A. Guezzaz, Security analysis of Ye et al. authentication protocol for internet of things, in Proc. International Conference on Big Data and Smart Digital Environment, Casablanca, Morocco, 2018, pp. 67–74.
M. Azrour, J. Mabrouki, A. Guezzaz, and A. Kanwal, Internet of things security: Challenges and key issues, Security and Communication Networks, vol. 2021, p. 5533843, 2021.
A. Guezzaz, S. Benkirane, and M. Azrour, A novel anomaly network intrusion detection system for internet of things security, in IoT and Smart Devices for Sustainable Environment, M. Azrour, A. Irshad, and R. Chaganti, eds. Cham, Switzerland: Springer, 2022, pp. 129–138.
A. Guezzaz, A. Asimi, M. Azrour, Z. Tbatou, and Y. Asimi, A multilayer perceptron classifier for monitoring network traffic, in Proc. 3rd International Conference on Big Data and Networks Technologies, Leuven, Belgium, 2019, pp. 262–270.
S. Benkirane, Road safety against sybil attacks based on RSU collaboration in VANET environment, in Proc. 5th International Conference on Mobile, Secure, and Programmable Networking, Mohammedia, Morocco, 2019, pp. 163–172.
Q. Zhang, L. Cheng, and R. Boutaba, Cloud computing: State-of-the-art and research challenges, J. Internet Serv. Appl., vol. 1, pp. 7–18, 2010.
M. K. Srinivasan, K. Sarukesi, P. Rodrigues, M. S. Manoj, and P. Revathy, State-of-the-art cloud computing security taxonomies: A classification of security challenges in the present cloud computing environment, in Proc. 2012 International Conference on Advances in Computing, Communications and Informatics, Chennai, India, 2012, pp. 470–476.
A. L. Buczak and E. Guven, A survey of data mining and machine learning methods for cyber security intrusion detection, IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.
A. Alshammari and A. Aldribi, Apply machine learning techniques to detect malicious network traffic in cloud computing, Journal of Big Data, vol. 8, p. 90, 2021.
A. Géron, Hands-On Machine Learning with Scikit-Learn & TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. Sebastopol, CA, USA: O’Reilly Media, Inc., 2017.
N. Chand, P. Mishra, C. R. Krishna, E. S. Pilli, and M. C. Govil, A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection, in Proc. 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA), Dehradun, India, 2016, pp. 1–6.
A. B. Nassif, M. A. Talib, Q. Nasir, H. Albadani, and F. M. Dakalbab, Machine learning for cloud security: A systematic review, IEEE Access, vol. 9, pp. 20717–20735, 2021.
D. Kwon, H. Kim, J. Kim, S. C. Suh, I. Kim, and K. J. Kim, A survey of deep learning-based network anomaly detection, Cluster Comput., vol. 22, pp. 949–961, 2017.
M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study, Journal of Information Security and Applications, vol. 50, p. 102419, 2020.
V. Kanimozhi and T. P. Jacob, Calibration of various optimized machine learning classifiers in network intrusion detection system on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing, International Journal of Engineering Applied Sciences and Technology, vol. 4, no. 6, pp. 209–213, 2019.
L. Zhou, X. Ouyang, H. Ying, L. Han, Y. Cheng, and T. Zhang, Cyber-attack classification in smart grid via deep neural network, in Proc. 2nd International Conference on Computer Science and Application Engineering, Hohhot, China, 2018, pp. 1–5.
T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, Deep learning approach for network intrusion detection in software defined networking, in Proc. 2016 International Conference on Wireless Networks and Mobile Communications, Fez, Morocco, 2016, pp. 258–263.
L. Zhang, L. Shi, N. Kaja, and D. Ma, A two-stage deep learning approach for can intrusion detection, in Proc. 2018 Ground Vehicle Syst. Eng. Technol. Symp. (GVSETS), Novi, MI, USA, 2018, pp. 1–11.
A. Mishra, B. B. Gupta, D. Perakovic, F. J. G. Penalvo, and C. H. Hsu, Classification based machine learning for detection of DDoS attack in cloud computing, in Proc. 2021 IEEE International Conference on Consumer Electronics, Las Vegas, NV, USA, 2021, pp. 1–4.
F. Jiang, Y. Fu, B. B. Gupta, Y. Liang, S. Rho, F. Lou, F. Meng, and Z. Tian, Deep learning based multi-channel intelligent attack detection for data security, IEEE Transactions on Sustainable Computing, vol. 5, no. 2, pp. 204–212, 2018.
A. N. Khan, M. Y. Fan, A. Malik, and R. A. Memon, Learning from privacy preserved encrypted data on cloud through supervised and unsupervised machine learning, in Proc. 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies, Sukkur, Pakistan, 2019, pp. 1–5.
S. Potluri and C. Diedrich, Accelerated deep neural networks for enhanced intrusion detection system, in Proc. 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation, Berlin, Germany, 2016, pp. 1–8.
J. Kim, J. Kim, H. L. T. Thu, and H. Kim, Long short term memory recurrent neural network classifier for intrusion detection, in Proc. 2016 International Conference on Plateform Technology and Service, Jeju, Republic of Korea, 2016, pp. 1–5.
J. Zhang, Anomaly detecting and ranking of the cloud computing platform by multi-view learning, Multimedia Tools and Applications, vol. 78, pp. 30923–30942, 2019.
A. Mubarakali, K. Srinivasan, R. Mukhalid, S. C. Jaganathan, and N. Marina, Security challenges in Internet of things: Distributed denial of service attack detection using support vector machine-based expert systems, Computational Intelligence, vol. 36, no. 4, pp. 1580–1592, 2020.
N. M. Abdulkareem and A. M. Abdulazeez, Machine learning classification based on radom forest algorithm: A review, International Journal of Science and Business, vol. 5, no. 2, pp. 128–142, 2021.
L. Breiman, Random forests, Machine Learning, vol. 45, pp. 5–32, 2001.
I. Reis, D. Baron, and S. Shahaf, Probabilistic random forest: A machine learning algorithm for noisy data sets, The Astronomical Journal, vol. 157, no. 1, p. 16, 2018.
J. Ali, R. Khan, N. Ahmad, and I. Maqsood, Random forests and decision trees, IJCSI International Journal of Computer Science Issues, vol. 9, no. 5, pp. 272–278, 2012.
B. O. Yigin, O. Algin, and G. Saygili, Comparison of morphometric parameters in prediction of hydrocephalus using random forests, Computers in Biology and Medicine, vol. 116, p. 103547, 2020.
A. Sarica, A. Cerasa, and A. Quattrone, Random forest algorithm for the classification of neuroimaging data in alzheimer’s disease: A systematic review, Frontiers in Aging Neuroscience, vol. 9, p. 329, 2017.
A. Devarakonda, N. Sharma, P. Saha, and S. Ramya, Network intrusion detection: A comparative study of four classifiers using the NSL-KDD and KDD’99 datasets, Journal of Physics: Conference Series, vol. 2161, p. 012043, 2022.
M. Zeeshan, Q. Riaz, M. A. Bilal, M. K. Shahzad, H. Jabeen, S. A. Haider, and A. Rahim, Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT data-sets, IEEE Access, vol.10, pp. 2269–2283, 2021.
M. Shafiq, Z. Tian, A. K. Bashir, X. Du, and M. Guizani, CorrAUC: A malicious Bot-IoT traffic detection method in IoT network using machine-learning techniques, IEEE Internet Things J., vol. 8, no. 5, pp. 3242–3254, 2021.
M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. Guizani, Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for Internet of things in smart city, Future Generation Computer Systems, vol. 107, pp. 433–442, 2020.
M. Hossin and M. N. Sulaiman, A review on evaluation metrics for data classification evaluations, International Journal of Data Mining & Knowledge Management Process, .