Security threats and attacks in cloud

A Mohammed - International journal of computer science and …, 2021 - kiss.kstudy.com
The amount of information and data in the digital era is increasing tremendously.
Continuous online connectivity is generating a massive amount of data that needs to store in …

Securing cloud computing from different attacks using intrusion detection systems

O Achbarou, S El Bouanani - 2017 - reunir.unir.net
Cloud computing is a new way of integrating a set of old technologies to implement a new
paradigm that creates an avenue for users to have access to shared and configurable …

ADAPT: Attack detection and prevention via deep learning techniques

M Mohan, V Tamizhazhagan… - Journal of Intelligent & …, 2024 - content.iospress.com
Cloud computing is a new technology that provides services to customers anywhere,
anytime, under varying conditions and managed by a third-party cloud provider. Even …

How Can Organizations Prevent Cyber Attacks Using Proper Cloud Computing Security?

IM Bahkali, SK Semwal - … of the Future Technologies Conference (FTC) …, 2022 - Springer
Cloud Computing is a collection of services and products delivered over a network or the
Internet. The intruder no longer has to attack the user's entire infrastructure. They can point …

[PDF][PDF] Secure the cloud computing environment from attackers using intrusion detection system

TVS Jeganathan, A Prakasam - International Journal of Advanced …, 2014 - Citeseer
Cloud computing is a method of novel internet infrastructure and demand industrial feature
that IT offers today. It provides a framework for end users easily attaching powerful services …

Novel intrusion detection system for cloud computing: A case study

MY Liao, ZK Mo, MY Luo, CS Yang, JL Chen - Cloud Computing and Big …, 2015 - Springer
Because of the growth in cloud computing and manturity of virtualization technology, many
enterprises are virtualizing their servers to increase server utilization and lower costs …

A review on cloud security

D Sinanc, S Sagiroglu - Proceedings of the 6th International Conference …, 2013 - dl.acm.org
This article presents a brief overview on cloud computing security in terms of security
considerations, models, threats and precautions. The articles published in recent years were …

Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment

VS Bai, M Punithavalli - Multimedia Tools and Applications, 2024 - Springer
Cloud computing (CC) was extremely implemented by the application service providers
(ASP) and enterprises for reducing either operational or capital expenditures. Services and …

An Approach for Preventing and Detecting Attacks in the Cloud

LH Merino, M Cukier - … on Utility and Cloud Computing (UCC), 2020 - ieeexplore.ieee.org
Preventing and detecting attacks in the cloud are difficult tasks involving technical, financial,
and legal challenges. Baseline security solutions from cloud providers are often inadequate …

[PDF][PDF] Deep reinforcement learning based automatic intrusion detection and diagnosis approach for cloud computing attacks

RR Palle - academia.edu
The expansion of cloud computing settings is undergoing a major boom in the contemporary
period, receiving widespread support. The rising ubiquity of Internet-connected gadgets …