Suchitra N Shenoy

Work place: Department of Electronics & Communication Engineering, Canara Engineering College, Benjanapadavu, India.

E-mail:

Website:

Research Interests: Computer systems and computational processes, Computational Learning Theory, Image Manipulation, Image Processing

Biography

Suchitra N Shenoy received her B. E degree in Electronics and Communication Engineering from Canara Engineering College, Bantwal, MS degree in VLSI CAD from MIT, Manipal, India Her major research interest is in the fields of Image Processing and Machine Learning. She has 2 years of industrial experience and currently pursuing her Ph.D. in the area of Image Processing at Visvesvaraya Technological University, India.

Author Articles
Exploring Deep Learning Techniques in Cloud Computing to Detect Malicious Network Traffic: A Sustainable Computing Approach

By Nagesh Shenoy H K. R. Anil Kumar Suchitra N Shenoy Abhishek S. Rao Rajgopal K T

DOI: https://doi.org/10.5815/ijwmt.2021.05.02, Pub. Date: 8 Oct. 2021

The demand for cloud computing systems has increased tremendously in the IT sector and various business applications due to their high computation and cost-effective solutions to various computing problems. This increased demand has raised several challenges such as load balancing and security in cloud systems. Numerous approaches have been presented for load balancing but providing security and maintaining integrity and privacy remains a less explored research area. Intrusion detection systems have emerged as a promising solution to predict attacks. In this work, we develop a deep learning-based scheme that contains data pre-processing, convolution operations, BiLSTM model, attention layer, and CRF modeling. The current study employs a machine learning-based approach to detect intrusions based on the attackers' historical behavior. Deep learning algorithms were used to extract features from the image and determine the significance of dense packets to generate the salient fine-grained feature that can be used to detect malicious traffic and presents the final classification using fused features.

[...] Read more.
Other Articles