Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
Advanced Network Anomaly Detection in Cisco Secure Workload Environments using AI and Machine Learning
Author(s):
1. M. Ramana Kumar: Dept. of CSE, Kommuri Pratap Reddy Institute of Technology,Hyderabad, Telangana, Pakistan
Abstract:
With the rapid evolution of modern computing environments, network security has become a paramount concern to protect data and prevent cyberattacks. Cisco Secure Workload, as part of Cisco's comprehensive security ecosystem, plays a crucial role in safeguarding data center and cloud networks. However, detecting anomalies in network behavior, which may signal security breaches or vulnerabilities, presents a significant challenge. Traditional network anomaly detection methods, including rulebased and signature-based techniques, often struggle to adapt to the dynamic nature and complexity of modern network traffic. This study explores the need for advanced anomaly detection approaches in Cisco Secure Workload environments to address emerging cyber threats and the sophisticated tactics used by attackers. By leveraging cutting-edge data analytics, machine learning, and artificial intelligence, the project aims to develop adaptive and accurate methods for identifying network anomalies in real-time. The proposed approach utilizes machine learning models to analyze traffic patterns, detect unwanted access attempts, and identify deviations in network behavior, ensuring rapid response to potential security issues. This research contributes to enhancing network security in Cisco Secure Workload environments, providing a more robust defense against evolving cyber threats.
Page(s): 205-211
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 16, Issue: 2, Year: 2024
Keywords:
Supervised Learning , Decision Trees , Network anomalies , Secure workload , Computing Hosts , Ensemble modelling
References:
[1] Taleb T. .2022 ."A Survey on In-Network Computing: Programmable Data Plane and Technology Specific Applications,". in IEEE Communications Surveys & Tutorials, 3213237(1) : 701-761.
[2] Saxena . D.,Gupta R.,Singh A. K.,Vasilakos A. V. .2023 ."Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds,". in IEEE Transactions on Automation Science and Engineering, 3319373 : .
[3] Kashani . M. H.,Mahdipour E. .2022 ."Load Balancing Algorithms in Fog Computing,". in IEEE Transactions on Services Computing, 3174475(1521) : 1505.
[4] . M. M. I. Khan G.,Nencioni G. .2023 ."Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective,". in IEEE Access, 3306534 : 89433-89454.
[5] Walia . G. K.,Kumar M.,Gill S. S. .2023 ."AI-Empowered Fog/Edge Resource Management for IoT Applications: A Comprehensive Review, Research Challenges and Future Perspectives,". in IEEE Communications Surveys & Tutorials, 3338015 : .
[6] Wang S.,Zhao Q.,Du S.,Zhou A.,Ma X.,Yang F. .2020 .'Dependency-aware task scheduling in vehicular edge computing,'' IEEE Internet Things J. , 7(6) : 4961-4971.
[7] Noor-A-Rahim Z.,Liu H.,Lee G. G. M. N.,Ali D.,Pesch P.,Xiao P. .2022 .'A survey on resource allocation in vehicular networks. '' IEEE Trans. Intell. Transp. Syst., 23(2) : 701-721.
[8] . A.B. De Souza P. A. L.,Rego T.,Carneiro J. D. C.,Rodrigues P. P. R.,Filho J. N.,De Souza V.,Chamola V.,C. De Albuquerque B.,Sikdar B. .2020 .'Computation offloading for vehicular environments: A survey,'' IEEE Access. , 8 : 198214-198243.
[9] Ye F.,Mei J.,Liu B.,Li K. .2022 .'A novel task offloading algorithm based on an integrated trust mechanism in mobile edge computing. '' J. Parallel Distrib. Comput., 169 : 185-198.
[10] Materwala L.,Ismail R. M.,Shubair R.,Buyya R. .2022 .'EnergySLA-aware genetic algorithm for edge-cloud integrated computation offloading in vehicular networks. '' Future Gener. Comput. Syst., 135 : 205-222.
[11] Tang X.,Wen Z.,Chen J.,Li Y.,Li W. .2021 .'Joint optimization task offloading strategy for mobile edge computing. Big Data Artif. Intell. (ICIBA), : 515-518.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

2

Views