Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

A systematic review of security threats and countermeasures in SaaS

MÁ Díaz de León Guillén… - Journal of computer …, 2020 - content.iospress.com
Among the service models provided by the cloud, the software as a service (SaaS) model
has had the greatest growth. This service model is an attractive option for organizations, as …

A survey and classification of XML based attacks on web applications

C Gupta, RK Singh, AK Mohapatra - Information Security Journal …, 2020 - Taylor & Francis
ABSTRACT XML based attacks are executed in web applications through crafted XML
document that forces XML parser to process un-validated documents. This leads to …

Data Mining Techniques and Applications: A Ten-Year Update

N Rahman - … Journal of Strategic Information Technology and …, 2018 - igi-global.com
Data mining has been gaining attention with the complex business environments, as a rapid
increase of data volume and the ubiquitous nature of data in this age of the internet and …

Design challenges and assessment of modern web applications intrusion detection and prevention systems (IDPS)

Y Sadqi, M Mekkaoui - Innovations in Smart Cities Applications Volume 4 …, 2021 - Springer
Intrusion detection and prevention systems (IDPS) are primarily designed to observe, detect
and prevent malicious activity on the network. However, the characteristics of traditional …

[PDF][PDF] Protection of XML-based denial-of-service and HTTP flooding attacks in web services using the middleware tool

A Alasri, R Sulaiman - International Journal of Engineering and …, 2018 - researchgate.net
A web service is defined as the method of communication between the web applications and
the clients. Web services are very flexible and scalable as they are independent of both the …

[PDF][PDF] Reducing the Effect of Denial of Service in Web Service Environment

A Alshayea, MAH Eljinini - Journal of Advances in Information Technology, 2023 - jait.us
Denial of Service (DoS) attacks can cost online and web service providers money and
damage their reputations. The lack of security protection in web services creates a …

Graph-based fuzzy approach against DDoS attacks

C Ates, S Özdel, E Anarim - Journal of Intelligent & Fuzzy …, 2020 - content.iospress.com
While internet technologies have been evolving day by day, threats against them have been
increasing with the same pace. One of the most serious and commonly executed attack type …

Association Rule Mining for Intrusion Detection System: A Survey

D Selvamani, V Selvi - Asian Journal of Engineering and Applied …, 2019 - ajeat.com
Many modern intrusion detection systems are based on data mining and database-centric
architecture, where a number of data mining techniques have been found. Among the most …

[PDF][PDF] A Comprehensive Review of Intrusion Detection System Approach and Technique

OA Ebere, I Led, UTG Ekene, DG Chijioke… - International Journal of …, 2021 - ijaem.net
The problem of securing information and data flows has existed from the origin of network
communication. Diverse approaches have been developed to protect and transfer such …