Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017 - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

DNS based infection scores

PK Manadhata - US Patent 10,474,820, 2019 - Google Patents
Abstract Systems and methods associated with domain name system (DNS) based infection
scores. One example method includes maintaining query profiles for members of a set of …

[PDF][PDF] Fuzzy automaton as a detection mechanism for the multi-step attack

M Almseidin, I Piller, M Al-Kasassbeh… - International Journal on …, 2019 - academia.edu
The integration of a fuzzy system and automaton theory can form the concept of fuzzy
automaton. This integration allows a discretely defined state-machine to act on continuous …

[PDF][PDF] Fuzzy Automaton-based Early Detection Model

M Almseidin - 2020 - 193.6.1.94
Nowadays, network administrators face stressful environments with an overload of network
traffics. Network traffic needs to be analyzed and investigated to detect abnormalities. The …

[CITATION][C] Efficiient Techniques for Intrusion Detection in Cloud Environment...

P Mishra - 2017 - MNIT Jaipur