On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A survey of intrusion detection techniques in cloud

C Modi, D Patel, B Borisaniya, H Patel, A Patel… - Journal of network and …, 2013 - Elsevier
In this paper, we survey different intrusions affecting availability, confidentiality and integrity
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …

A survey on intrusion detection systems for fog and cloud computing

V Chang, L Golightly, P Modesti, QA Xu, LMT Doan… - Future Internet, 2022 - mdpi.com
The rapid advancement of internet technologies has dramatically increased the number of
connected devices. This has created a huge attack surface that requires the deployment of …

A survey on security issues and solutions at different layers of Cloud computing

C Modi, D Patel, B Borisaniya, A Patel… - The journal of …, 2013 - Springer
Cloud computing offers scalable on-demand services to consumers with greater flexibility
and lesser infrastructure investment. Since Cloud services are delivered using classical …

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

S Iqbal, MLM Kiah, B Dhaghighi, M Hussain… - Journal of Network and …, 2016 - Elsevier
Major provisioning of cloud computing is mainly delivered via Software as a Service,
Platform as a Service and Infrastructure as a Service. However, these service delivery …

Anomaly detection system in cloud environment using fuzzy clustering based ANN

N Pandeeswari, G Kumar - Mobile Networks and Applications, 2016 - Springer
Cloud computing affords lot of resources and computing facilities through Internet. Cloud
systems attract many users with its desirable features. In spite of them, Cloud systems may …

Malware detection in cloud computing infrastructures

MR Watson, AK Marnerides, A Mauthe… - … on Dependable and …, 2015 - ieeexplore.ieee.org
Cloud services are prominent within the private, public and commercial domains. Many of
these services are expected to be always on and have a critical nature; therefore, security …

Voting extreme learning machine based distributed denial of service attack detection in cloud computing

GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …

Cloud computing review: concepts, technology, challenges and security

MN Birje, PS Challagidad… - … Journal of Cloud …, 2017 - inderscienceonline.com
Cloud computing delivers IT-related capabilities as a service through internet to multiple
customers and these services are charged based on consumption. Many cloud computing …

A survey of virtual machine management in edge computing

Z Tao, Q **a, Z Hao, C Li, L Ma, S Yi… - Proceedings of the …, 2019 - ieeexplore.ieee.org
Many edge computing systems rely on virtual machines (VMs) to deliver their services. It is
challenging, however, to deploy the virtualization mechanisms on edge computing hardware …