Javascript must be enabled to continue!
Analysis of Network Security in IoT-based Cloud Computing Using Machine Learning
View through CrossRef
Network security in IoT-based cloud computing can benefit greatly from the application of machine learning techniques. IoT devices introduce unique security challenges with their large-scale deployments and diverse nature. Machine learning can help address these challenges by analyzing IoT network traffic, detecting anomalies, identifying potential threats, and enhancing overall network security. The security of cloud networks is validated using binary classification to detect attacks. Random forest classifiers achieved an accuracy of 96%, while K nearest classifier had an accuracy of 93% and a precision value of 0.96. The proposed model ensures security of big data against intrusion attacks on the network. Although machine learning techniques can be powerful for protecting cloud computing networks, challenges still need to be addressed before widespread adoption. Understanding the potential and limitations of machine learning approaches to network security canhelp researchers and practitioners develop more effective strategies for safeguarding their systems in an increasingly interconnected world. Network security of big data in cloud computing can be enhanced by applying machine learning techniques. Machine learning algorithms can analyze large amounts of data to detect patterns, anomalies, and potential security threats. Here are several ways machine learning can be utilized to improve network security in the context of big data and cloud computing.
Lahore Garrison University
Title: Analysis of Network Security in IoT-based Cloud Computing Using Machine Learning
Description:
Network security in IoT-based cloud computing can benefit greatly from the application of machine learning techniques.
IoT devices introduce unique security challenges with their large-scale deployments and diverse nature.
Machine learning can help address these challenges by analyzing IoT network traffic, detecting anomalies, identifying potential threats, and enhancing overall network security.
The security of cloud networks is validated using binary classification to detect attacks.
Random forest classifiers achieved an accuracy of 96%, while K nearest classifier had an accuracy of 93% and a precision value of 0.
96.
The proposed model ensures security of big data against intrusion attacks on the network.
Although machine learning techniques can be powerful for protecting cloud computing networks, challenges still need to be addressed before widespread adoption.
Understanding the potential and limitations of machine learning approaches to network security canhelp researchers and practitioners develop more effective strategies for safeguarding their systems in an increasingly interconnected world.
Network security of big data in cloud computing can be enhanced by applying machine learning techniques.
Machine learning algorithms can analyze large amounts of data to detect patterns, anomalies, and potential security threats.
Here are several ways machine learning can be utilized to improve network security in the context of big data and cloud computing.
Related Results
A Study of Moving from Cloud Computing to Fog Computing
A Study of Moving from Cloud Computing to Fog Computing
The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capa...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
Advancements of cloud computing called for the storage of big data through the use of clouds but this came with a lot of risk. Thus, this thesis is aimed to manage these risks by p...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Security and Privacy Issues in Cloud Computing
Security and Privacy Issues in Cloud Computing
<p>With a variety of software and hardware services available to users, cloud computing has developed in recent years as a very influential and transformational technology. I...
Security and Privacy Issues in Cloud Computing
Security and Privacy Issues in Cloud Computing
<p>With a variety of software and hardware services available to users, cloud computing has developed in recent years as a very influential and transformational technology. I...

