[HTML][HTML] Cyber security in iot-based cloud computing: A comprehensive survey

W Ahmad, A Rasool, AR Javed, T Baker, Z Jalil - Electronics, 2021 - mdpi.com
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …

A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges

A Thakkar, R Lohiya - Archives of Computational Methods in Engineering, 2021 - Springer
Abstract Internet of Things (IoT) is widely accepted technology in both industrial as well as
academic field. The objective of IoT is to combine the physical environment with the cyber …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A survey of intrusion detection systems leveraging host data

RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …

MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review

G Kumar, K Thakur, MR Ayyagari - The Journal of Supercomputing, 2020 - Springer
Network security plays an essential role in secure communication and avoids financial loss
and crippled services due to network intrusions. Intruders generally exploit the flaws of …

Intrusion detection systems in the cloud computing: A comprehensive and deep literature review

Z Liu, B Xu, B Cheng, X Hu… - … : Practice and Experience, 2022 - Wiley Online Library
Abrupt development of resources and rising expenses of infrastructure are leading
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …

[PDF][PDF] Survey on intrusion detection system types

SM Othman, NT Alsohybe, FM Ba-Alwi… - International Journal of …, 2018 - researchgate.net
Intrusion detection system (IDS) is one of amongst the most essential consideration of cyber-
security that can discover intrusion before and/or after attack occur. An Intrusion detection …

Feature selection using a combination of ant colony optimization and random forest algorithms applied to isolation forest based intrusion detection system

O Lifandali, N Abghour, Z Chiba - Procedia Computer Science, 2023 - Elsevier
For businesses to operate effectively, networks and computer systems have become crucial
instruments. They are now used in all professional fields, including the military, universities …

New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm

Z Chiba, N Abghour, K Moussaid… - International Journal …, 2019 - search.proquest.com
Cloud computing is distributed architecture, providing computing facilities and storage
resource as a service over an open environment (Internet), this lead to different matters …

Probabilistic real-time intrusion detection system for docker containers

S Srinivasan, A Kumar, M Mahajan, D Sitaram… - Security in Computing …, 2019 - Springer
The use of containers has become mainstream and ubiquitous in cloud environments. A
container is a way to abstract processes and file systems into a single unit separate from the …