An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

False alarm minimization techniques in signature-based intrusion detection systems: A survey

N Hubballi, V Suryanarayanan - Computer Communications, 2014 - Elsevier
A network based Intrusion Detection System (IDS) gathers and analyzes network packets
and report possible low level security violations to a system administrator. In a large network …

Alert correlation in collaborative intelligent intrusion detection systems—A survey

HT Elshoush, IM Osman - Applied Soft Computing, 2011 - Elsevier
As complete prevention of computer attacks is not possible, intrusion detection systems
(IDSs) play a very important role in minimizing the damage caused by different computer …

Architectural tactics for big data cybersecurity analytics systems: a review

F Ullah, MA Babar - Journal of Systems and Software, 2019 - Elsevier
Abstract Context Big Data Cybersecurity Analytics (BDCA) systems leverage big data
technologies for analyzing security events data to protect organizational networks …

Machine learning for detecting data exfiltration: A review

B Sabir, F Ullah, MA Babar, R Gaire - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software
Engineering (SE) has recently taken significant steps in proposing countermeasures for …

A bounded index for cluster validity

S Saitta, B Raphael, IFC Smith - Machine Learning and Data Mining in …, 2007 - Springer
Clustering is one of the most well known types of unsupervised learning. Evaluating the
quality of results and determining the number of clusters in data is an important issue. Most …

MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review

G Kumar, K Thakur, MR Ayyagari - The Journal of Supercomputing, 2020 - Springer
Network security plays an essential role in secure communication and avoids financial loss
and crippled services due to network intrusions. Intruders generally exploit the flaws of …

Detection of frequent alarm patterns in industrial alarm floods using itemset mining methods

W Hu, T Chen, SL Shah - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
The presence of alarm floods is identified as the main reason for low efficiency of alarm
systems and the leading cause of many industrial accidents. In practice, a commonly used …

A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems

A Patel, H Alhussian, JM Pedersen, B Bounabat… - Computers & …, 2017 - Elsevier
Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected
through open networks that are potentially susceptible to cyber-attacks with very acute …

A framework for DNS based detection and mitigation of malware infections on a network

E Stalmans, B Irwin - 2011 Information Security for South Africa, 2011 - ieeexplore.ieee.org
Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection
and increase resilience. These techniques bypass traditional detection systems such as …