Flow based analysis of Advanced Persistent Threats detecting targeted attacks in cloud computing

A Vance - 2014 First International Scientific-Practical …, 2014 - ieeexplore.ieee.org
Cloud computing provides industry, government, and academic users' convenient and cost-
effective access to distributed services and shared data via the Internet. Due to its …

[PDF][PDF] Overview of passive attacks in cloud environment

A Raich, V Gadicha - AIP Conference Proceedings, 2022 - academia.edu
Cloud computing provide services on demand. However, it is highly vulnerable to attacks
and compromises security and privacy of data. The attacks are broadly classified as active …

Exploring the landscape of network security: a comparative analysis of attack detection strategies

P Rajesh Kanna, P Santhi - Journal of Ambient Intelligence and …, 2024 - Springer
The field of computer networking is experiencing rapid growth, accompanied by the swift
advancement of internet tools. As a result, people are becoming more aware of the …

A comparative analysis of different intrusion detection techniques in cloud computing

A Bakshi, Sunanda - … International Conference, ICAICR 2018, Shimla, India …, 2019 - Springer
Nowadays, the foremost optimal choice of every IT organization is cloud computing. Cloud
computing technology is very flexible and scalable in nature. The prime concern in cloud …

[PDF][PDF] Cyber Security Architecture Components for Cloud Network

TM Mbelli - academia.edu
The cyber security landscape is constantly evolving and changing with attackers developing
new tools and techniques to access organizations' systems and data. Public and private …

[图书][B] IDSaaS: Intrusion Detection system as a Service in public clouds

T Alharkan - 2013 - search.proquest.com
In a public cloud computing environment, consumers cannot always just depend on the
cloud provider's security infrastructure. They may need to monitor and protect their virtual …

[HTML][HTML] Intrusion detection system in cloud environment: Literature survey & future research directions

S Lata, D Singh - International Journal of Information Management Data …, 2022 - Elsevier
The cloud provides infrastructure, applications, and storage services to users that need to be
protected by some policies or procedures. Hence, security in the cloud is to protect user data …

[PDF][PDF] Introduction to anomaly detection in cloud computing environments

E Frank, J Oluwaseyi - 2024 - researchgate.net
Anomaly detection is a crucial aspect of ensuring the security, reliability, and performance of
cloud computing environments. As the adoption of cloud services continues to grow, the …

Security threats and solutions in cloud computing

H Eken - World Congress on Internet Security (WorldCIS-2013), 2013 - ieeexplore.ieee.org
Information Technology infrastructure continues to grow with evolving technology. The
invention of the Internet has increased the use of computer and the mobile device …

FAPA: flooding attack protection architecture in a cloud system

K Zunnurhain, SV Vrbsky… - International Journal of …, 2014 - inderscienceonline.com
The rate of acceptance of clouds each year is making cloud computing the leading IT
computational technology. While cloud computing can be productive and economical, it is …