A survey of intrusion detection techniques in cloud

C Modi, D Patel, B Borisaniya, H Patel, A Patel… - Journal of network and …, 2013‏ - Elsevier
In this paper, we survey different intrusions affecting availability, confidentiality and integrity
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …

The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010‏ - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures

A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023‏ - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
develo** advanced cyber weapons. They have equipped with the most advanced …

Network anomaly detection system using genetic algorithm and fuzzy logic

AH Hamamoto, LF Carvalho, LDH Sampaio… - Expert Systems with …, 2018‏ - Elsevier
Due to the sheer number of applications that uses computer networks, in which some are
crucial to users and enterprises, network management is essential. Therefore, integrity and …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018‏ - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …

An implementation of intrusion detection system using genetic algorithm

MS Hoque, MA Mukit, MAN Bikas - arxiv preprint arxiv:1204.1336, 2012‏ - arxiv.org
Nowadays it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organizations. But secured data …

Effective intrusion detection system to secure data in cloud using machine learning

A Aldallal, F Alisa - Symmetry, 2021‏ - mdpi.com
When adopting cloud computing, cybersecurity needs to be applied to detect and protect
against malicious intruders to improve the organization's capability against cyberattacks …

Research trends in network-based intrusion detection systems: A review

S Kumar, S Gupta, S Arora - Ieee Access, 2021‏ - ieeexplore.ieee.org
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …

Automatic network intrusion detection: Current techniques and open issues

CA Catania, CG Garino - Computers & Electrical Engineering, 2012‏ - Elsevier
Automatic network intrusion detection has been an important research topic for the last
20years. In that time, approaches based on signatures describing intrusive behavior have …

[PDF][PDF] Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm

S Paliwal, R Gupta - International Journal of Computer Applications, 2012‏ - Citeseer
Nowadays it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organizations. But secured data …