Using internal sensors and embedded detectors for intrusion detection
Journal of Computer Security
Evaluation of Intrusion Detectors: A Decision Theory Approach
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition
A Smart Sensor to Detect the Falls of the Elderly
IEEE Pervasive Computing
Denial-of-Service Attack-Detection Techniques
IEEE Internet Computing
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
IEEE Transactions on Dependable and Secure Computing
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure mobile agent execution in virtual environment
Autonomous Agents and Multi-Agent Systems
Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
ACM Computing Surveys (CSUR)
Decentralized multi-dimensional alert correlation for collaborative intrusion detection
Journal of Network and Computer Applications
Journal of Network and Computer Applications
Cloud Computing and the Common Man
Computer
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Distributed Intrusion Detection in Clouds Using Mobile Agents
ADVCOMP '09 Proceedings of the 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences
Alarm clustering for intrusion detection systems in computer networks
Engineering Applications of Artificial Intelligence
Data mining and machine learning-Towards reducing false positives in intrusion detection
Information Security Tech. Report
Intrusion Detection in the Cloud
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Filtering intrusion detection alarms
Cluster Computing
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Distributed instrusion prevention in active and extensible networks
IWAN'04 Proceedings of the 6th IFIP TC6 international working conference on Active networks
A new intrusion detection method based on antibody concentration
ICIC'09 Proceedings of the Intelligent computing 5th international conference on Emerging intelligent computing technology and applications
Google Android: A Comprehensive Security Assessment
IEEE Security and Privacy
An ontology-based intrusion alerts correlation system
Expert Systems with Applications: An International Journal
Intrusion Detection for Grid and Cloud Computing
IT Professional
Ontological approach toward cybersecurity in cloud computing
Proceedings of the 3rd international conference on Security of information and networks
A cost-based analysis of intrusion detection system configuration under active or passive response
Decision Support Systems
A new distributed intrusion detection method based on immune mobile agent
LSMS/ICSEE'10 Proceedings of the 2010 international conference on Life system modeling and and intelligent computing, and 2010 international conference on Intelligent computing for sustainable energy and environment: Part I
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems
COMPSACW '10 Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops
Understanding Cloud Computing Vulnerabilities
IEEE Security and Privacy
Intrusion detection system in cloud computing environment
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
Virtual machine monitor-based lightweight intrusion detection
ACM SIGOPS Operating Systems Review
Alert correlation in collaborative intelligent intrusion detection systems-A survey
Applied Soft Computing
Cloud-based malware detection for evolving data streams
ACM Transactions on Management Information Systems (TMIS)
Parametric methods for anomaly detection in aggregate traffic
IEEE/ACM Transactions on Networking (TON)
Anomaly-based intrusion detection in software as a service
DSNW '11 Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops
Intrusion Detection Techniques for Infrastructure as a Service Cloud
DASC '11 Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
An immunity-based dynamic multilayer intrusion detection system
ICIC'06 Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III
Future Generation Computer Systems
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
CIDS: A Framework for Intrusion Detection in Cloud Systems
ITNG '12 Proceedings of the 2012 Ninth International Conference on Information Technology - New Generations
Pragmatic assessment of research intensive areas in cloud: a systematic review
ACM SIGSOFT Software Engineering Notes
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. The traditional Intrusion Detection and Prevention Systems (IDPS) are largely inefficient to be deployed in cloud computing environments due to their openness and specific essence. This paper surveys, explores and informs researchers about the latest developed IDPSs and alarm management techniques by providing a comprehensive taxonomy and investigating possible solutions to detect and prevent intrusions in cloud computing systems. Considering the desired characteristics of IDPS and cloud computing systems, a list of germane requirements is identified and four concepts of autonomic computing self-management, ontology, risk management, and fuzzy theory are leveraged to satisfy these requirements.