Effective Intrusion Detection System using Hybrid Ensemble Method for Cloud Computing

N Maheswaran, S Bose, S Sonny… - … on Advances in …, 2023 - ieeexplore.ieee.org
Due to its adaptability and pay-per-use services, cloud computing has grown in popularity
among businesses, but security and privacy issues are still very much present. Intruders can …

Optimization of deep generative intrusion detection system for cloud computing: challenges and scope for improvements

N Wankhade, A Khandare - EAI Endorsed Transactions on …, 2023 - publications.eai.eu
The large amount of data and its exponential increase result in security problems which
subsequently cause damage to cloud computing and its environments. The Intrusion …

[HTML][HTML] Towards an intelligent intrusion detection system to detect malicious activities in cloud computing

H Attou, M Mohy-eddine, A Guezzaz, S Benkirane… - Applied Sciences, 2023 - mdpi.com
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics,
such as scalability and flexibility. However, despite these advantages, security concerns …

A Scalable and Stacked Ensemble Approach to Improve Intrusion Detection in Clouds

MR Ghazi, NS Raghava - Information Technology and Control, 2023 - itc.ktu.lt
The availability of automated data collection techniques and the growth in the amount of
data collected from cloud network traffic and cloud resource activities has transformed into a …

A Sorting-AB Approach for an Enhanced IDS in Cloud Environment

H Attou, A Guezzaz, S Benkirane, M Azrour - The International Conference …, 2022 - Springer
Cloud computing (CC) is currently the most popular option for companies due to its flexibility
and pay-per-use services. Nonetheless, privacy and security issues are important hurdles in …

Comparative Analysis of Weighted Ensemble and Majority Voting Algorithms for Intrusion Detection in OpenStack Cloud Environments.

P Patil, G Kale, N Bivalkar… - International Journal of …, 2023 - search.ebscohost.com
In the ever-evolving landscape of cybersecurity, the detection of malicious activities within
cloud environments remains a critical challenge. This research aims to compare the …

Intrusion detection systems in the cloud computing: A comprehensive and deep literature review

Z Liu, B Xu, B Cheng, X Hu… - … : Practice and Experience, 2022 - Wiley Online Library
Abrupt development of resources and rising expenses of infrastructure are leading
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …

[PDF][PDF] Documentation for the isot cloud intrusion detection benchmark dataset (isot-cid)

A Aldribi, I Traore, PG Quinan… - University of …, 2020 - onlineacademiccommunity.uvic.ca
Cloud computing is susceptible to traditional IT attacks because it leverages the existing IT
infrastructure, operating systems (OSs), and applications. In addition to the conventional …

A survey and analysis of intrusion detection models based on information security and object technology-cloud intrusion dataset

Y Ayachi, Y Mellah, M Saber… - … Journal of Artificial …, 2022 - search.proquest.com
Nowadays society, economy, and critical infrastructures have become principally dependent
on computers, networks, and information technology solutions, on the other side, cyber …

A cloud-based intrusion detection system for advanced threat detection and prevention using machine learning techniques

R Abhinav, KN Raghav, SS Reddy… - 2023 14th …, 2023 - ieeexplore.ieee.org
With the escalating number and complexity of cyber-attacks, in the realm of network security,
intrusion detection systems (IDS) hold significant significance in protecting organizations …