0% Complete
فارسی
Home
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
An Attention-Enhanced Hybrid Deep Learning Framework for Detecting Denial-of-Wallet Attacks in Serverless Platforms
Authors :
Mohammad Mehmandoost
1
HadiShahriar Shahhoseini
2
1- دانشگاه علم و صنعت ایران
2- دانشگاه علم و صنعت ایران
Keywords :
Denial-of-Wallet،serverless computing،cybersecurity،deep learning
Abstract :
Denial-of-Wallet (DoW) attacks pose a significant threat to serverless computing frameworks, as they exploit auto-scaling capabilities to inflate operational costs. This paper presents a hybrid deep learning framework, for effective detection of Denial-of-Wallet attacks. Our architecture couples Convolutional Neural Networks for feature extraction with Long Short-Term Memory networks and Gated Recurrent Units to learn temporal dependencies and a Bahdanau attention mechanism to enhance feature relevance. To address class imbalance and improve feature consistency, data are preprocessed using the Synthetic Minority Oversampling Technique and Standard Scaler. Experimental results demonstrate our model achieving a detection rate of 98.3\% with one of the quickest inference times compared with similar methods while concurrently maintaining a lightweight architecture with fewer parameters. These features make our model specially suitable for real-time detection of Denial-of-Wallet attacks in serverless environments.
Papers List
List of archived papers
ParaKavosh: A Parallel Algorithm for Finding Biological Network Motifs
Dr Zahra Razaghi Moghadam Kashani - Dr Ali Masoudi-nejad - Dr Abbas Nowzari-dalini
Silicon photonic microring resonators: A Novel optical router based on Negative-First routing algorithm
Negin Bagheri Renani - Elham Yaghoubi
Distributed coordination protocol for event data exchange in IoT monitoring applications
Behnam Khazael - Hadi Tabatabaee Malazi
Intra Class Feature Learning and Supervised Triplet Sampling for Deep Metric Learning
Hamideh Rafiee - Ahmad Ali Abin - Seyed Soroush Majd - Viet-Vu Vu
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Arman Sepehr - Mohammadzaman Zamani - Hamid Beigy - Shabnam Behzad
بهبود تشخیص نفوذ به شبکه اینترنت اشیاء با استفاده از مدل ترکیبی الگوریتم های بهینهسازی ازدحام ذرات، گرگ خاکستری و جنگل تصادفی
مهدی علیرضانژاد - عمار عبیس حسین المعموری
Embedded speech encoder for low-resource languages
Alireza A.Tabatabaei - Pouria Sameti - Ali Bohlooli
Handling Data Heterogeneity in Federated Medical Images Classification
Alireza Maleki - Hassan Khotanlou
Aligning the Brick and Mortar cosmetic with digital transformation as the right way to overhaul the In-store Experience
Mehrgan Malekpour - Dr Federica Caboni
Leveraging Retrieval-Augmented Generation for Persian University Knowledge Retrieval
Arshia Hemmat - Mohammad Hassan Heydari - Kianoosh Vadaei - Afsaneh Fatemi
more
Samin Hamayesh - Version 42.5.2