On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

An ensemble of prediction and learning mechanism for improving accuracy of anomaly detection in network intrusion environments

Imran, F Jamil, D Kim - Sustainability, 2021 - mdpi.com
The connectivity of our surrounding objects to the internet plays a tremendous role in our
daily lives. Many network applications have been developed in every domain of life …

A survey of cloud-based network intrusion detection analysis

N Keegan, SY Ji, A Chaudhary, C Concolato… - … -centric Computing and …, 2016 - Springer
As network traffic grows and attacks become more prevalent and complex, we must find
creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers …

Feature selection algorithms in intrusion detection system: A survey

S Maza, M Touahria - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
Regarding to the huge number of connections and the large flow of data on the Internet,
Intrusion Detection System (IDS) has a difficulty to detect attacks. Moreover, irrelevant and …

An anomaly-based approach for DDoS attack detection in cloud environment

A Rawashdeh, M Alkasassbeh… - … Journal of Computer …, 2018 - inderscienceonline.com
Cloud computing is currently a major focal point for researchers owing to its widespread
application and benefits. Cloud computing's complete reliance on the internet for service …

A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem

MS Al-Daweri, S Abdullah, KAZ Ariffin - International Journal of Critical …, 2021 - Elsevier
Network security is a mechanism of protecting the usability and integrity of any given
network and its transmitted data. Network security's effectiveness is crucial to the network …

A survey of feature selection techniques in intrusion detection system: A soft computing perspective

P Ravi Kiran Varma, V Valli Kumari… - Progress in Computing …, 2018 - Springer
In the process of detecting different kinds of attacks in anomaly-based intrusion detection
system (IDS), both normal and attack data are profiled with the help of selected attributes …

Game theory approach for detecting vulnerable data centers in cloud computing network

S Hosseini, R Vakili - International Journal of Communication …, 2019 - Wiley Online Library
Nowadays, cloud computing has many benefits to accessibility, scalability, and cost‐
effectiveness, leading to network security risks and vulnerabilities. Cloud computing is …

HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment

PS Bisht, P Mishra, P Chauhan… - International Journal of …, 2023 - inderscienceonline.com
Cloud computing provides delivery of computing resources as a service on a pay-as-you-go
basis. It represents a shift from products being purchased, to products being subscribed as a …

A Harmony Search-Based Feature Selection Technique for Cloud Intrusion Detection

WM Makki, MMD Siraj, NM Ibrahim - Emerging Trends in Intelligent …, 2020 - Springer
Recently cloud computing has enjoyed widespread patronage due to its economy of scale
and flexibility. However Cloud computing is confronted with security challenges. Intrusion …