Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog

N Moustafa, KKR Choo, I Radwan… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Current anomaly detection systems (ADSs) apply statistical and machine learning
algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced …

Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review

CN Modi, K Acha - the Journal of Supercomputing, 2017 - Springer
Virtualization plays a vital role in the construction of cloud computing. However, various
vulnerabilities are existing in current virtualization implementations, and thus there are …

Detecting DDoS attacks in cloud computing environment

AM Lonea, DE Popescu, H Tianfield - International Journal of …, 2013 - univagora.ro
This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS)
attacks in cloud computing environments. This type of attacks is often the source of cloud …

Enhancing big data security with collaborative intrusion detection

Z Tan, UT Nagar, X He, P Nanda, RP Liu… - IEEE cloud …, 2014 - ieeexplore.ieee.org
Big data, often stored in cloud networks, is changing our business models and applications.
Rich information residing in big data is driving business decision making to be a data-driven …

A review on intrusion detection techniques for cloud computing and security challenges

SG Kene, DP Theng - 2015 2nd International Conference on …, 2015 - ieeexplore.ieee.org
Nowadays, Cloud Computing is the first choice of every IT organization because of its
scalable and flexible nature. However, the security and privacy is a major concern in its …

A design of an integrated cloud-based intrusion detection system with third party cloud service

W Elmasry, A Akbulut, AH Zaim - Open Computer Science, 2021 - degruyter.com
Although cloud computing is considered the most widespread technology nowadays, it still
suffers from many challenges, especially related to its security. Due to the open and …

Intrusion detection system in cloud computing: Challenges and opportunities

Y Mehmood, MA Shibli, U Habiba… - 2013 2nd national …, 2013 - ieeexplore.ieee.org
Today, Cloud Computing is the preferred choice of every IT organization since it provides
flexible and pay-per-use based services to its users. However, the security and privacy is a …