An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

Network forensics: Review, taxonomy, and open challenges

S Khan, A Gani, AWA Wahab, M Shiraz… - Journal of Network and …, 2016 - Elsevier
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …

Distributed Denial of Service detection using hybrid machine learning technique

M Barati, A Abdullah, NI Udzir… - … on Biometrics and …, 2014 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) is a major threat among many security issues. To
overcome this problem, many studies have been carried out by researchers, however due to …

Cloud-based intrusion detection and response system: open research issues, and solutions

Z Inayat, A Gani, NB Anuar, S Anwar… - Arabian Journal for …, 2017 - Springer
Mobile cloud computing (MCC) allows smart mobile devices (SMD) to access the cloud
resources in order to offload data from smartphones and to acquire computational services …

Network forensics based on fuzzy logic and expert system

N Liao, S Tian, T Wang - Computer Communications, 2009 - Elsevier
Network forensics is a research area that finds the malicious users by collecting and
analyzing the intrusion or infringement evidence of computer crimes such as hacking. In the …

HyINT: signature-anomaly intrusion detection system

R Kumar, D Sharma - 2018 9th International Conference on …, 2018 - ieeexplore.ieee.org
Information plethora being generated in an organization tends to the evolution of cloud
computing technologies for efficient management and accessibility of voluminous data. With …

A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing

S Khan, M Shiraz, AW Abdul Wahab… - The Scientific World …, 2014 - Wiley Online Library
Network forensics enables investigation and identification of network attacks through the
retrieved digital content. The proliferation of smartphones and the cost‐effective universal …

Towards an applicability of current network forensics for cloud networks: A SWOT analysis

S Khan, A Gani, AWA Wahab, S Iqbal… - IEEE …, 2016 - ieeexplore.ieee.org
In recent years, the migration of the computational workload to computational clouds has
attracted intruders to target and exploit cloud networks internally and externally. The …

Analysis of challenges in modern network forensic framework

S Qureshi, J Li, F Akhtar, S Tunio… - Security and …, 2021 - Wiley Online Library
Network forensics can be an expansion associated with network security design which
typically emphasizes avoidance and detection of community assaults. It covers the necessity …

[PDF][PDF] Secure communication using RSA algorithm for network environment

A Jain, V Kapoor - International Journal of Computer Applications, 2015 - academia.edu
Secure communication in network environment is primary requirement to access remote
resources in a controlled and efficient way. For validation and authentication in e-banking …