Security issues in cloud environments: a survey
DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …
integration of cloud environments in the industry, which has been consequently motivating …
An intrusion detection and prevention system in cloud computing: A systematic review
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
A survey on cloud computing security: Issues, threats, and solutions
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …
services to consumers with greater flexibility in a cost effective manner. While moving …
Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog
Current anomaly detection systems (ADSs) apply statistical and machine learning
algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced …
algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced …
Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review
CN Modi, K Acha - the Journal of Supercomputing, 2017 - Springer
Virtualization plays a vital role in the construction of cloud computing. However, various
vulnerabilities are existing in current virtualization implementations, and thus there are …
vulnerabilities are existing in current virtualization implementations, and thus there are …
Detecting DDoS attacks in cloud computing environment
AM Lonea, DE Popescu, H Tianfield - International Journal of …, 2013 - univagora.ro
This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS)
attacks in cloud computing environments. This type of attacks is often the source of cloud …
attacks in cloud computing environments. This type of attacks is often the source of cloud …
Enhancing big data security with collaborative intrusion detection
Big data, often stored in cloud networks, is changing our business models and applications.
Rich information residing in big data is driving business decision making to be a data-driven …
Rich information residing in big data is driving business decision making to be a data-driven …
A review on intrusion detection techniques for cloud computing and security challenges
Nowadays, Cloud Computing is the first choice of every IT organization because of its
scalable and flexible nature. However, the security and privacy is a major concern in its …
scalable and flexible nature. However, the security and privacy is a major concern in its …
A design of an integrated cloud-based intrusion detection system with third party cloud service
Although cloud computing is considered the most widespread technology nowadays, it still
suffers from many challenges, especially related to its security. Due to the open and …
suffers from many challenges, especially related to its security. Due to the open and …
Intrusion detection system in cloud computing: Challenges and opportunities
Y Mehmood, MA Shibli, U Habiba… - 2013 2nd national …, 2013 - ieeexplore.ieee.org
Today, Cloud Computing is the preferred choice of every IT organization since it provides
flexible and pay-per-use based services to its users. However, the security and privacy is a …
flexible and pay-per-use based services to its users. However, the security and privacy is a …