[HTML][HTML] A review of anomaly detection systems in cloud networks and survey of cloud security measures in cloud storage applications

A Sari - Journal of Information Security, 2015 - scirp.org
Cloud computing has become one of the most projecting words in the IT world due to its
design for providing computing service as a utility. The typical use of cloud computing as a …

A design of an integrated cloud-based intrusion detection system with third party cloud service

W Elmasry, A Akbulut, AH Zaim - Open Computer Science, 2021 - degruyter.com
Although cloud computing is considered the most widespread technology nowadays, it still
suffers from many challenges, especially related to its security. Due to the open and …

An anomaly-based approach for DDoS attack detection in cloud environment

A Rawashdeh, M Alkasassbeh… - … Journal of Computer …, 2018 - inderscienceonline.com
Cloud computing is currently a major focal point for researchers owing to its widespread
application and benefits. Cloud computing's complete reliance on the internet for service …

Feature selection and intrusion detection in cloud environment based on machine learning algorithms

A Javadpour, SK Abharian… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Characteristics and way of behavior of attacks and infiltrators on computer networks are
usually very difficult and need an expert. In addition; the advancement of computer networks …

[PDF][PDF] Intrusion detection and prevention in cloud environment: A systematic review

I Raghav, S Chhikara, N Hasteer - International Journal of Computer …, 2013 - Citeseer
The traditional intrusion detection system is not flexible in providing security in cloud
computing because of the distributed structure of cloud computing. This paper surveys the …

Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach

MN Ismail, A Aborujilah, S Musa… - Proceedings of the 7th …, 2013 - dl.acm.org
The internet is gaining a lot of importance day by day, especially with the emergence of
cloud technology. This new technology has made a new computing service to end users that …

C SVM Classification and KNN Techniques for Cyber Crime Detection

K Veena, K Meena, Y Teekaraman… - Wireless …, 2022 - Wiley Online Library
In the digital age, cybercrime is spreading its root widely. Internet evolution has turned out to
a boon as well as curse for those confronting the issues of privacy, national security, social …

Integrated intrusion detection and prevention system with honeypot in cloud computing

S Ravji, M Ali - 2018 International Conference on Computing …, 2018 - ieeexplore.ieee.org
Most organisations are now migrating their services into the cloud to offer a more flexible,
open, mobile and ubiquitous service. However, this also brings more exposure to security …

A collaborative intrusion detection and prevention system in cloud computing

H Mohamed, L Adil, T Saida, M Hicham - 2013 Africon, 2013 - ieeexplore.ieee.org
Cloud Computing has emerged as a model to process large volumetric data. Though Cloud
Computing is very popular, cloud security could delay its adoption. Security of the cloud …

[PDF][PDF] Cooperative trust framework for cloud computing based on mobile agents

H Toumi, A Talea, B Marzak, A Eddaoui… - International Journal of …, 2015 - researchgate.net
Cloud computing opens doors to the multiple, unlimited venues from elastic computing to on
demand provisioning to dynamic storage, reduce the potential costs through optimized and …