An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

[HTML][HTML] Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm

A John, IFB Isnin, SHH Madni, FB Muchtar - Intelligent Systems with …, 2024 - Elsevier
The intrusion detection system (IDS) model, which can identify the presence of intruders in
the network and take some predefined action for safe data transit across the network, is …

Explainable AI-based innovative hybrid ensemble model for intrusion detection

U Ahmed, Z Jiangbin, A Almogren, S Khan… - Journal of Cloud …, 2024 - Springer
Cybersecurity threats have become more worldly, demanding advanced detection
mechanisms with the exponential growth in digital data and network services. Intrusion …

[PDF][PDF] Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks

N Ravichandran, T Tewaraja, V Rajasegaran… - Preprints. org, 2024 - preprints.org
With all the sophisticated threats to network security, intrusion detection is a section of the
security technology industry that is becoming increasingly significant. In this research paper …

Distributed Denial of Service detection using hybrid machine learning technique

M Barati, A Abdullah, NI Udzir… - … on Biometrics and …, 2014 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) is a major threat among many security issues. To
overcome this problem, many studies have been carried out by researchers, however due to …

[PDF][PDF] Examining the role of artificial intelligence in cyber security (CS): A systematic review for preventing prospective solutions in financial transactions

MR Faraji, F Shikder, MH Hasan, MM Islam… - International …, 2024 - academia.edu
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Intrusion detection in cloud computing

M Ficco, L Tasquier, R Aversa - 2013 Eighth International …, 2013 - ieeexplore.ieee.org
Cloud Computing represents both a technology for using computing infrastructures in a
more efficient way, and a business model for selling computing resources and services. On …

[HTML][HTML] iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF

HJ Hadi, M Adnan, Y Cao, FB Hussain, N Ahmad… - Technologies, 2024 - mdpi.com
The development of new technologies has significantly enhanced the monitoring and
analysis of network traffic. Modern solutions like the Extended Berkeley Packet Filter (eBPF) …

Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks

SS Alqahtany, A Shaikh, A Alqazzaz - Scientific Reports, 2025 - nature.com
Smart devices are enabled via the Internet of Things (IoT) and are connected in an
uninterrupted world. These connected devices pose a challenge to cybersecurity systems …