On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
A survey of intrusion detection techniques in cloud
In this paper, we survey different intrusions affecting availability, confidentiality and integrity
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …
A survey on intrusion detection systems for fog and cloud computing
The rapid advancement of internet technologies has dramatically increased the number of
connected devices. This has created a huge attack surface that requires the deployment of …
connected devices. This has created a huge attack surface that requires the deployment of …
A survey on security issues and solutions at different layers of Cloud computing
Cloud computing offers scalable on-demand services to consumers with greater flexibility
and lesser infrastructure investment. Since Cloud services are delivered using classical …
and lesser infrastructure investment. Since Cloud services are delivered using classical …
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
Major provisioning of cloud computing is mainly delivered via Software as a Service,
Platform as a Service and Infrastructure as a Service. However, these service delivery …
Platform as a Service and Infrastructure as a Service. However, these service delivery …
Anomaly detection system in cloud environment using fuzzy clustering based ANN
N Pandeeswari, G Kumar - Mobile Networks and Applications, 2016 - Springer
Cloud computing affords lot of resources and computing facilities through Internet. Cloud
systems attract many users with its desirable features. In spite of them, Cloud systems may …
systems attract many users with its desirable features. In spite of them, Cloud systems may …
Malware detection in cloud computing infrastructures
MR Watson, AK Marnerides, A Mauthe… - … on Dependable and …, 2015 - ieeexplore.ieee.org
Cloud services are prominent within the private, public and commercial domains. Many of
these services are expected to be always on and have a critical nature; therefore, security …
these services are expected to be always on and have a critical nature; therefore, security …
Voting extreme learning machine based distributed denial of service attack detection in cloud computing
GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …
This attack makes the cloud services inaccessible to the end-users by exhausting resources …
Cloud computing review: concepts, technology, challenges and security
MN Birje, PS Challagidad… - … Journal of Cloud …, 2017 - inderscienceonline.com
Cloud computing delivers IT-related capabilities as a service through internet to multiple
customers and these services are charged based on consumption. Many cloud computing …
customers and these services are charged based on consumption. Many cloud computing …
A survey of virtual machine management in edge computing
Many edge computing systems rely on virtual machines (VMs) to deliver their services. It is
challenging, however, to deploy the virtualization mechanisms on edge computing hardware …
challenging, however, to deploy the virtualization mechanisms on edge computing hardware …