A review of machine learning-based intrusion detection systems on the cloud

N Srivastava, A Chaudhari, N Joraviya… - Security, Privacy and …, 2022 - Springer
N Srivastava, A Chaudhari, N Joraviya, BN Gohil, S Ray, UP Rao
Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021, 2022Springer
Organizations and individuals adopted cloud computing due to its scalability and flexibility.
At the same time, it has become more vulnerable due to the interactions of various cloud
stakeholders. One of the most popular security mechanisms for detecting various attacks on
the cloud is the Intrusion Detection System (IDS). This paper presents an overview of
different cloud intrusion detection techniques. Further, we highlight the use of IDS along with
various Machine Learning (ML) techniques.
Abstract
Organizations and individuals adopted cloud computing due to its scalability and flexibility. At the same time, it has become more vulnerable due to the interactions of various cloud stakeholders. One of the most popular security mechanisms for detecting various attacks on the cloud is the Intrusion Detection System (IDS). This paper presents an overview of different cloud intrusion detection techniques. Further, we highlight the use of IDS along with various Machine Learning (ML) techniques.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果