A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog

N Moustafa, KKR Choo, I Radwan… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Current anomaly detection systems (ADSs) apply statistical and machine learning
algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced …

The evolution of distributed systems towards microservices architecture

T Salah, MJ Zemerly, CY Yeun… - 2016 11th …, 2016 - ieeexplore.ieee.org
Applications developed to fulfil distributed systems needs have been growing rapidly. Major
evolutions have happened beginning with basic architecture relying on initiated request by a …

Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking

A Aldribi, I Traoré, B Moa, O Nwamuo - Computers & Security, 2020 - Elsevier
Cloud computing is facing a multidimensional and rapidly evolving threat landscape, making
intrusion detection more challenging. This paper introduces a new hypervisor-based cloud …

A review of intrusion detection systems in cloud computing

C Zouhair, N Abghour, K Moussaid… - Security and Privacy in …, 2018 - igi-global.com
Security is a major challenge faced by cloud computing (CC) due to its open and distributed
architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality …

Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)

F Tlili, S Ayed, LC Fourati - Computers & Security, 2024 - Elsevier
Distributed intrusion detection systems (DIDS) are a specialized subset of conventional IDSs
designed for implementation in distributed environments. Each IDS is integrated into distinct …

[PDF][PDF] Automatic building of a powerful IDS for the cloud based on deep neural network by using a novel combination of simulated annealing algorithm and improved …

Z Chiba, MSEK Alaoui, N Abghour… - International Journal of …, 2022 - academia.edu
Cloud computing (CC) is the fastest-growing data hosting and computational technology that
stands today as a satisfactory answer to the problem of data storage and computing …

New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm

Z Chiba, N Abghour, K Moussaid… - International Journal …, 2019 - search.proquest.com
Cloud computing is distributed architecture, providing computing facilities and storage
resource as a service over an open environment (Internet), this lead to different matters …

A centralized HIDS framework for private cloud

Z Wang, Y Zhu - 2017 18th IEEE/ACIS International Conference …, 2017 - ieeexplore.ieee.org
Cloud computing is more convenient and efficient than traditional on-premise computing for
users, as it provides large scale resources, software, and information to each customer …

An efficient federated learning based intrusion detection system using LS2DNN with PBKA based lightweight privacy preservation in cloud server

R Gupta, T Alam - Multimedia Tools and Applications, 2024 - Springer
To execute seamless computing along with information sharing, Cloud Computing (CC)
plays an important role in measurable resource sharing. But, owing to its open and …