An intrusion detection and prevention system in cloud computing: A systematic review
… intrusion prevention systems (IPS) or intrusion detection … Cloud computing is only recently
adopted worldwide; therefore, there are very few practical and experimental intrusion detection …
adopted worldwide; therefore, there are very few practical and experimental intrusion detection …
[PDF][PDF] Intrusion detection system for cloud computing
MPK Shelke, MS Sontakke, AD Gawande - International Journal of …, 2012 - Citeseer
… this kind of intrusion detection is that we can add new rules without modifying existing ones.
Intrusion detection (ID) is a type of security management system for computers and networks…
Intrusion detection (ID) is a type of security management system for computers and networks…
Intrusion detection systems in cloud computing paradigm: analysis and overview
… This article reviews various intrusion detection systems related to cloud computing. The …
develop an adaptive intrusion detection system that adapts to changing cloud architecture. …
develop an adaptive intrusion detection system that adapts to changing cloud architecture. …
Intrusion detection system in cloud computing: Challenges and opportunities
Y Mehmood, MA Shibli, U Habiba… - 2013 2nd national …, 2013 - ieeexplore.ieee.org
… of different intrusions in cloud. Then, we analyze some existing cloud based intrusion
detection systems (IDS) with respect to their type, positioning, detection time, detection technique, …
detection systems (IDS) with respect to their type, positioning, detection time, detection technique, …
A cooperative intrusion detection system framework for cloud computing networks
CC Lo, CC Huang, J Ku - 2010 39th International Conference …, 2010 - ieeexplore.ieee.org
… In this paper, we propose a cooperative intrusion detection system for clouding computing
network to reduce the impact of DoS attack. By doing this, if one of the cloud computing …
network to reduce the impact of DoS attack. By doing this, if one of the cloud computing …
Intrusion detection in cloud computing
M Ficco, L Tasquier, R Aversa - … , Cloud and Internet Computing, 2013 - ieeexplore.ieee.org
… a framework to build distributed Intrusion Detection architecture in the Cloud Computing. It is
… and deploy security probes on the customer’s virtual resources and the Cloud infrastructure. …
… and deploy security probes on the customer’s virtual resources and the Cloud infrastructure. …
Intrusion detection systems in the cloud computing: A comprehensive and deep literature review
Z Liu, B Xu, B Cheng, X Hu… - … : Practice and Experience, 2022 - Wiley Online Library
… Ghorbani and Hashemi 172 proposed architecture for intrusion detection of cloud
computing based on the pattern. The specific attacks are important in customizing the detection …
computing based on the pattern. The specific attacks are important in customizing the detection …
Intrusion detection in the cloud
… in the area of Cloud Computing. … of Intrusion Detection Systems in the Cloud. We discuss
and list several existing threats for a Cloud infrastructure and are motivated to use Intrusion …
and list several existing threats for a Cloud infrastructure and are motivated to use Intrusion …
A review on intrusion detection techniques for cloud computing and security challenges
… intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems
with respect to their various types, positioning, detection time, detection techniques, data …
with respect to their various types, positioning, detection time, detection techniques, data …
[HTML][HTML] Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm
B Hajimirzaei, NJ Navimipour - Ict Express, 2019 - Elsevier
… This paper proposes a new intrusion detection system (IDS) based on a combination of a
multilayer perceptron (MLP) network, and artificial bee colony (ABC) and fuzzy clustering …
multilayer perceptron (MLP) network, and artificial bee colony (ABC) and fuzzy clustering …
相关搜索
- network intrusion detection cloud computing
- attack and intrusion detection cloud computing
- intrusion detection cloud environment
- intrusion detection in cloud fuzzy entropy
- intrusion detection system
- intrusion detection techniques
- intrusion detection mechanism cloud computing
- cloud intrusion detection model
- intrusion detection approach
- intrusion detection in cloud belief network
- network intrusion detection cloud framework
- proactive attack detection cloud computing
- cloud computing environment
- intelligent intrusion detection system cloud computing
- hybrid intrusion detection approach cloud computing