Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

A survey of intrusion detection techniques in cloud

C Modi, D Patel, B Borisaniya, H Patel, A Patel… - Journal of network and …, 2013 - Elsevier
In this paper, we survey different intrusions affecting availability, confidentiality and integrity
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective

SN Shirazi, A Gouglidis, A Farshad… - IEEE Journal on …, 2017 - ieeexplore.ieee.org
Mobile edge computing (MEC) and fog are emerging computing models that extend the
cloud and its services to the edge of the network. The emergence of both MEC and fog …

An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

Cloud computing security: A survey

IM Khalil, A Khreishah, M Azeem - Computers, 2014 - mdpi.com
Cloud computing is an emerging technology paradigm that migrates current technological
and computing concepts into utility-like solutions similar to electricity and water systems …

Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

S Iqbal, MLM Kiah, B Dhaghighi, M Hussain… - Journal of Network and …, 2016 - Elsevier
Major provisioning of cloud computing is mainly delivered via Software as a Service,
Platform as a Service and Infrastructure as a Service. However, these service delivery …

A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions

M Burhan, H Alam, A Arsalan, RA Rehman… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …

[BOOK][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …