Article Preview
TopIntroduction
In today`s era, the latesest technology enables the sharing of multiple resources like storage, or may be network bandwidth, and/or computational cpabilities Aamir, M., & Zaidi, S. M. A. (2019). The authors Alzahrani, R. J., & Alzahrani, A. (2021) said that it gives both the business and individual users the ability to use resources as per their demands like cloud computing. In addition to details on the safety precautions that have been taken, the SLA document provides exhaustive information on the services that have been rendered. Users who save their data in the cloud express significant apprehension and worry about the cloud's potential to compromise the confidentiality of their information. Even while cloud servers are protected from intrusions by security measures, there are still instances in which an assault could be carried out undetected. The static security model employed by on-premises software applications is undermined by the dynamic nature of cloud platforms. Invasive cancer is the biggest cause of death worldwide, especially among women. Early cancer detection is vital to health. Early identification of breast cancer improves prognosis and survival odds by allowing for timely clinical therapy. For accurate cancer prediction, machine learning requires quick analytics and feature extraction. Cloud-based machine learning Chartuni, A., & Márquez, J. (2021) and Chelliah, P. R., & Surianarayanan, C. (2021) is vital for illness diagnosis in rural areas with few medical facilities
The majority of attacks Chopra, M. et al. (2022) that have been documented in cloud computing have been DDOS attacks, which aim to bring down a cloud's underlying network infrastructure.
DDOS attacks are executed by compromising and exploiting a huge number of hosts Cvitić, I.et al. (2021) and Dahiya, A., & Gupta, B. B. (2021) which are referred to as zombies, in order to launch an attack against the system that is being targeted. They do this by causing an abrupt exponential surge in traffic, which clogs up the network capacity and, as a result, prevents regular data from reaching its destination. This disrupts the normal flow of traffic on the network. Extortion has been acknowledged as one of the primary motivating elements behind this attack, which have begun to increase in scale and sophistication. As per author Dahiya, A., & Gupta, B. B. (2020) A Distributed Denial of Service (DDOS) assault is a type of malicious attack against cloud systems that can create significant disruptions.
The authors Gupta, B. B., & Badve, O. P. (2017) said that the existing solutions for protecting against distributed denial of service (DDOS) attacks need a data packet to be categorised as either legitimate or malicious Guebli, W., & Belkhir, A. (2021). These techniques can be broken down into two primary groups: those that are signature-based and those that are anomaly-based. Utilizing previously crafted attack signatures that have been saved in a database is one of the steps involved in the signature-based detection technique Gupta, B. B. et al. (2020). Using a method of detection that is based on signatures has one major drawback, which is that it is unable to locate new malware variants until the signatures of those variants are updated in the database. Gupta, B. B. et al. (2021) cybercriminals have the ability to avoid detection by using the amount of time that has passed since a new attack was launched and then updating the definitions that are stored in the database Gupta, B. B. et al. (2015) and Gupta, B. B. et al. (2022).