A survey of intrusion detection techniques in cloud

C Modi, D Patel, B Borisaniya, H Patel, A Patel… - Journal of network and …, 2013 - Elsevier
In this paper, we survey different intrusions affecting availability, confidentiality and integrity
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …

[HTML][HTML] Improving network intrusion detection system performance through quality of service configuration and parallel technology

W Bul'ajoul, A James, M Pannu - Journal of Computer and System …, 2015 - Elsevier
This paper outlines an innovative software development that utilises Quality of Service (QoS)
and parallel technologies in Cisco Catalyst Switches to increase the analytical performance …

Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing

CN Modi, DR Patel, A Patel, M Rajarajan - Procedia Technology, 2012 - Elsevier
One of the major security issues in Cloud computing is to detect malicious activities at the
network layer. In this paper, we propose a framework integrating network intrusion detection …

A novel framework for intrusion detection in cloud

C Modi, D Patel, B Borisanya, A Patel… - Proceedings of the fifth …, 2012 - dl.acm.org
One of the major security challenges in cloud computing is the detection and prevention of
denial-of-service (DoS) attacks. In order to detect and prevent DoS attacks as well as other …

Network intrusion detection systems in high-speed traffic in computer networks

W Bulajoul, A James, M Pannu - 2013 IEEE 10th International …, 2013 - ieeexplore.ieee.org
With the various and increasingly malicious attacks on networks and wireless systems,
traditional security tools such as anti-virus programs and firewalls are not sufficient to …

Exploring light-weight cryptography for efficient and secure lossy data compression

R Shan, S Di, JC Calhoun… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The enormous volume of data generated by large-scale instruments and simulations poses
significant challenges in archiving, transferring, sharing and analyzing data for various …

Software intrusion detection evaluation system: a cost-based evaluation of intrusion detection capability

AL Imoize, T Oyedare… - Communications and …, 2018 - digitalcommons.odu.edu
In this paper, we consider a cost-based extension of intrusion detection capability (CID). An
objective metric motivated by information theory is presented and based on this formulation; …

Efficient assessment and evaluation for websites vulnerabilities using SNORT

M Dabbour, IM Alsmadi, E Alsukhni - 2013 - digitalcommons.tamusa.edu
An endless number of methods or ways exists to access illegally a web server or a website.
The task of defending a system (eg network, server, website, etc.) is complex and …

[PDF][PDF] A survey on security issues in firewalls: a new approach for classifying firewall vulnerabilities

I Kashefi, M Kassiri, A Shahidinejad - Internationla Journal of Engineering …, 2013 - Citeseer
Along with the increasing growth of computer networks, security threats multiplies and
accordingly improving and enhancing the network security devices and methods become a …

Measuring inconsistency in a network intrusion detection rule set based on snort

K McAreavey, W Liu, P Miller, K Mu - International Journal of …, 2011 - World Scientific
In this preliminary study, we investigate how inconsistency in a network intrusion detection
rule set can be measured. To achieve this, we first examine the structure of these rules …