On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
An ensemble of prediction and learning mechanism for improving accuracy of anomaly detection in network intrusion environments
The connectivity of our surrounding objects to the internet plays a tremendous role in our
daily lives. Many network applications have been developed in every domain of life …
daily lives. Many network applications have been developed in every domain of life …
A survey of cloud-based network intrusion detection analysis
N Keegan, SY Ji, A Chaudhary, C Concolato… - … -centric Computing and …, 2016 - Springer
As network traffic grows and attacks become more prevalent and complex, we must find
creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers …
creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers …
Feature selection algorithms in intrusion detection system: A survey
S Maza, M Touahria - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
Regarding to the huge number of connections and the large flow of data on the Internet,
Intrusion Detection System (IDS) has a difficulty to detect attacks. Moreover, irrelevant and …
Intrusion Detection System (IDS) has a difficulty to detect attacks. Moreover, irrelevant and …
An anomaly-based approach for DDoS attack detection in cloud environment
Cloud computing is currently a major focal point for researchers owing to its widespread
application and benefits. Cloud computing's complete reliance on the internet for service …
application and benefits. Cloud computing's complete reliance on the internet for service …
A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem
Network security is a mechanism of protecting the usability and integrity of any given
network and its transmitted data. Network security's effectiveness is crucial to the network …
network and its transmitted data. Network security's effectiveness is crucial to the network …
A survey of feature selection techniques in intrusion detection system: A soft computing perspective
In the process of detecting different kinds of attacks in anomaly-based intrusion detection
system (IDS), both normal and attack data are profiled with the help of selected attributes …
system (IDS), both normal and attack data are profiled with the help of selected attributes …
Game theory approach for detecting vulnerable data centers in cloud computing network
S Hosseini, R Vakili - International Journal of Communication …, 2019 - Wiley Online Library
Nowadays, cloud computing has many benefits to accessibility, scalability, and cost‐
effectiveness, leading to network security risks and vulnerabilities. Cloud computing is …
effectiveness, leading to network security risks and vulnerabilities. Cloud computing is …
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment
PS Bisht, P Mishra, P Chauhan… - International Journal of …, 2023 - inderscienceonline.com
Cloud computing provides delivery of computing resources as a service on a pay-as-you-go
basis. It represents a shift from products being purchased, to products being subscribed as a …
basis. It represents a shift from products being purchased, to products being subscribed as a …
A Harmony Search-Based Feature Selection Technique for Cloud Intrusion Detection
Recently cloud computing has enjoyed widespread patronage due to its economy of scale
and flexibility. However Cloud computing is confronted with security challenges. Intrusion …
and flexibility. However Cloud computing is confronted with security challenges. Intrusion …