Intrusion Detection System Mechanisms in Cloud Computing: Techniques and Opportunities

N Innab, I Atoum, F Alghayadh… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Cloud computing has become a vital part of many organizations due to its ability to provide a
resilient IT infrastructure over the internet without being the owner of such infrastructure …

Assessment methodology for anomaly-based intrusion detection in cloud computing

M Rezvani - Journal of AI and Data Mining, 2018 - jad.shahroodut.ac.ir
Cloud computing has become an attractive target for attackers as the mainstream
technologies in the cloud, such as the virtualization and multitenancy, permit multiple users …

[PDF][PDF] An immunity-enhancing security module for cloud servers

T Okamoto - IJICIC, 2020 - ijicic.org
Cyberattacks on a vulnerability in a server application are threats to cloud servers.
Advanced endpoint security techniques can detect and mitigate cyberattacks on known and …

An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

[PDF][PDF] THREATS OF CLOUD COMPUTING AND ITS SECURITY-A SURVEY

D Painuli, D Mishra - researchgate.net
Cloud computing means we can store and access the data over the internet rather than in
the hard drive. So it is also known as internet computing. With the help of cloud computing …

Intrusion detection attack patterns in cloud computing: trust and risk assessment

A Chrysikos - 2018 - repository.londonmet.ac.uk
Dependence on cloud services has been steadily increasing in recent years, as cloud
services are an attractive option to offer flexibility and cost effectiveness through economies …

[PDF][PDF] EFFICIENT IMPROVEMENT AND HIGH PERFORMANCE APPROACH FOR MASQUERADE DETECTION ATTACKS

R Kanimozhi, V Sandhiya, V Ramya - 2016 - ijetcse.com
The extensive use of virtualization in implementing security infrastructure brings unrivaled
security concerns for tenants or customers and introduces an additional layer that itself must …

[PDF][PDF] Security threats and countermeasures in cloud computing

V Ashktorab, SR Taghizadeh - International Journal of …, 2012 - researchgate.net
Security concerns have given rise to immerging an active area of research due to the many
security threats that many organizations have faced at present. Addressing these issues …

Detecting Intrusion in Cloud using Snort: An Application towards Cyber-Security

F Rafa, Z Rahman, MM Mishu, M Hasan… - Proceedings of the 2nd …, 2022 - dl.acm.org
Internet, various kinds of services are delivered using cloud computing. These resources
include storing data, servers, databases records, networking systems, and software. Many …

Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

S Manzoor, A Gouglidis, M Bradbury… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Most Threat Analysis (TA) techniques analyze threats to targeted assets (eg, components,
services) by considering static interconnections among them. However, in dynamic …