A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …
intrusion detection and blockchain applications against cyber attacks. This work aims to …
Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog
Current anomaly detection systems (ADSs) apply statistical and machine learning
algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced …
algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced …
The evolution of distributed systems towards microservices architecture
T Salah, MJ Zemerly, CY Yeun… - 2016 11th …, 2016 - ieeexplore.ieee.org
Applications developed to fulfil distributed systems needs have been growing rapidly. Major
evolutions have happened beginning with basic architecture relying on initiated request by a …
evolutions have happened beginning with basic architecture relying on initiated request by a …
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking
Cloud computing is facing a multidimensional and rapidly evolving threat landscape, making
intrusion detection more challenging. This paper introduces a new hypervisor-based cloud …
intrusion detection more challenging. This paper introduces a new hypervisor-based cloud …
A review of intrusion detection systems in cloud computing
Security is a major challenge faced by cloud computing (CC) due to its open and distributed
architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality …
architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality …
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)
F Tlili, S Ayed, LC Fourati - Computers & Security, 2024 - Elsevier
Distributed intrusion detection systems (DIDS) are a specialized subset of conventional IDSs
designed for implementation in distributed environments. Each IDS is integrated into distinct …
designed for implementation in distributed environments. Each IDS is integrated into distinct …
[PDF][PDF] Automatic building of a powerful IDS for the cloud based on deep neural network by using a novel combination of simulated annealing algorithm and improved …
Cloud computing (CC) is the fastest-growing data hosting and computational technology that
stands today as a satisfactory answer to the problem of data storage and computing …
stands today as a satisfactory answer to the problem of data storage and computing …
New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm
Cloud computing is distributed architecture, providing computing facilities and storage
resource as a service over an open environment (Internet), this lead to different matters …
resource as a service over an open environment (Internet), this lead to different matters …
A centralized HIDS framework for private cloud
Z Wang, Y Zhu - 2017 18th IEEE/ACIS International Conference …, 2017 - ieeexplore.ieee.org
Cloud computing is more convenient and efficient than traditional on-premise computing for
users, as it provides large scale resources, software, and information to each customer …
users, as it provides large scale resources, software, and information to each customer …
An efficient federated learning based intrusion detection system using LS2DNN with PBKA based lightweight privacy preservation in cloud server
To execute seamless computing along with information sharing, Cloud Computing (CC)
plays an important role in measurable resource sharing. But, owing to its open and …
plays an important role in measurable resource sharing. But, owing to its open and …