[PDF][PDF] The role of intrusion detection/prevention systems in modern computer networks: A review

S Thapa, A Mailewa - Conference: Midwest Instruction and …, 2020 - easychair.org
The emergence of new devices that make use of the Internet as their primary utility has
made network security one of the most important domains in the world today. Intrusions in …

[PDF][PDF] Data integrity attacks in cloud computing: A review of identifying and protecting techniques

DVS Kaja, Y Fatima, AB Mailewa - J. homepage www. ijrpr. com …, 2022 - researchgate.net
Cloud computing is growing tremendously in recent years. Many organizations are switching
their traditional computing model to a cloud based because of its low cost and pay-as-you …

Analyzing host security using D‐S evidence theory and multisource information fusion

Y Li, S Yao, R Zhang, C Yang - International Journal of …, 2021 - Wiley Online Library
Security monitoring and analysis can help users to timely perceive threats faced by the host,
thereby protecting and backup data and improving the host's security status. In the research …

Discover botnets in IoT sensor networks: A lightweight deep learning framework with hybrid self-organizing maps

S Khan, AB Mailewa - Microprocessors and Microsystems, 2023 - Elsevier
In recent years, we have witnessed a massive growth of intrusion attacks targeted at Internet
of things (IoT) devices. Due to inherent security vulnerabilities, it has become an easy target …

Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities

AM Dissanayaka, S Mengel, L Gittner, H Khan - Cluster Computing, 2020 - Springer
It is essential to ensure the data security of data analytical frameworks as any security
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …

Vulnerability prioritization, root cause analysis, and mitigation of secure data analytic framework implemented with mongodb on singularity linux containers

AM Dissanayaka, S Mengel, L Gittner… - Proceedings of the 2020 …, 2020 - dl.acm.org
A Vulnerability Management system is a disciplined, programmatic approach to discover
and mitigate vulnerabilities in a system. While securing systems from data exploitation and …

[HTML][HTML] Mechanisms and techniques to enhance the security of big data analytic framework with mongodb and Linux containers

A Mailewa, S Mengel, L Gittner, H Khan - Array, 2022 - Elsevier
The frequency and scale of unauthorized access cases and misuses of data access
privileges are a growing concern of many organizations. The protection of confidential data …

Network anomaly uncovering on CICIDS-2017 dataset: a supervised artificial intelligence approach

P Jairu, AB Mailewa - 2022 IEEE International Conference on …, 2022 - ieeexplore.ieee.org
In today's world, businesses and services are shifted to a digital transformation. As a result,
network traffic has tremendously increased over the years. With that, network threats and …

Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices

MMA Khan, EN Ehabe… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The use of software to support the information infrastructure that governments, critical
infrastructure providers and businesses worldwide rely on for their daily operations and …

A review of penetration testing and vulnerability assessment in cloud environment

I Yurtseven, S Bagriyanik - 2020 Turkish National Software …, 2020 - ieeexplore.ieee.org
Cloud computing continues to provide easy, flexible, and cost-effective solutions and
services to both enterprises and unprofessional users. Many small and large-scale …