On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Malware classification and composition analysis: A survey of recent developments

A Abusitta, MQ Li, BCM Fung - Journal of Information Security and …, 2021 - Elsevier
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …

Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications

MK Hasan, M Shafiq, S Islam, B Pandey… - …, 2021 - Wiley Online Library
As the world keeps advancing, the need for automated interconnected devices has started to
gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been …

[HTML][HTML] Intrusion detection system in cloud environment: Literature survey & future research directions

S Lata, D Singh - International Journal of Information Management Data …, 2022 - Elsevier
The cloud provides infrastructure, applications, and storage services to users that need to be
protected by some policies or procedures. Hence, security in the cloud is to protect user data …

A deep learning approach for proactive multi-cloud cooperative intrusion detection system

A Abusitta, M Bellaiche, M Dagenais… - Future Generation …, 2019 - Elsevier
The last few years have witnessed the ability of cooperative cloud-based Intrusion Detection
Systems (IDS) in detecting sophisticated and unknown attacks associated with the complex …

Designing an efficient security framework for detecting intrusions in virtual network of cloud computing

R Patil, H Dudeja, C Modi - Computers & Security, 2019 - Elsevier
Cloud computing has grown for various IT capabilities such as IoTs, Mobile Computing,
Smart IT, etc. However, due to the dynamic and distributed nature of cloud and …

Detection of zero-day attacks: An unsupervised port-based approach

A Blaise, M Bouet, V Conan, S Secci - Computer Networks, 2020 - Elsevier
Last years have witnessed more and more DDoS attacks towards high-profile websites, as
the Mirai botnet attack on September 2016, or more recently the memcached attack on …

Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking

A Aldribi, I Traoré, B Moa, O Nwamuo - Computers & Security, 2020 - Elsevier
Cloud computing is facing a multidimensional and rapidly evolving threat landscape, making
intrusion detection more challenging. This paper introduces a new hypervisor-based cloud …

Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy

ZR Alashhab, M Anbar, MM Singh, IH Hasbullah… - Applied Sciences, 2022 - mdpi.com
Cloud computing (CC) plays a significant role in revolutionizing the information and
communication technology (ICT) industry, allowing flexible delivery of new services and …

Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review

CN Modi, K Acha - the Journal of Supercomputing, 2017 - Springer
Virtualization plays a vital role in the construction of cloud computing. However, various
vulnerabilities are existing in current virtualization implementations, and thus there are …