An intrusion detection and prevention system in cloud computing: A systematic review
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
Network forensics: Review, taxonomy, and open challenges
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …
investigate the increasing number of cybercrimes. Network forensics techniques assist in …
Distributed Denial of Service detection using hybrid machine learning technique
Distributed Denial of Service (DDoS) is a major threat among many security issues. To
overcome this problem, many studies have been carried out by researchers, however due to …
overcome this problem, many studies have been carried out by researchers, however due to …
Cloud-based intrusion detection and response system: open research issues, and solutions
Mobile cloud computing (MCC) allows smart mobile devices (SMD) to access the cloud
resources in order to offload data from smartphones and to acquire computational services …
resources in order to offload data from smartphones and to acquire computational services …
Network forensics based on fuzzy logic and expert system
N Liao, S Tian, T Wang - Computer Communications, 2009 - Elsevier
Network forensics is a research area that finds the malicious users by collecting and
analyzing the intrusion or infringement evidence of computer crimes such as hacking. In the …
analyzing the intrusion or infringement evidence of computer crimes such as hacking. In the …
HyINT: signature-anomaly intrusion detection system
Information plethora being generated in an organization tends to the evolution of cloud
computing technologies for efficient management and accessibility of voluminous data. With …
computing technologies for efficient management and accessibility of voluminous data. With …
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
Network forensics enables investigation and identification of network attacks through the
retrieved digital content. The proliferation of smartphones and the cost‐effective universal …
retrieved digital content. The proliferation of smartphones and the cost‐effective universal …
Towards an applicability of current network forensics for cloud networks: A SWOT analysis
In recent years, the migration of the computational workload to computational clouds has
attracted intruders to target and exploit cloud networks internally and externally. The …
attracted intruders to target and exploit cloud networks internally and externally. The …
Analysis of challenges in modern network forensic framework
Network forensics can be an expansion associated with network security design which
typically emphasizes avoidance and detection of community assaults. It covers the necessity …
typically emphasizes avoidance and detection of community assaults. It covers the necessity …
[PDF][PDF] Secure communication using RSA algorithm for network environment
A Jain, V Kapoor - International Journal of Computer Applications, 2015 - academia.edu
Secure communication in network environment is primary requirement to access remote
resources in a controlled and efficient way. For validation and authentication in e-banking …
resources in a controlled and efficient way. For validation and authentication in e-banking …