The utilization of artificial intelligence in a hybrid intrusion detection system
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Adaptive Neuro-Fuzzy Intrusion Detection Systems
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
SNPD-SAWN '05 Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks
Application of SVM and ANN for intrusion detection
Computers and Operations Research
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
SubVirt: Implementing malware with virtual machines
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining
WKDD '08 Proceedings of the First International Workshop on Knowledge Discovery and Data Mining
The Design and Application of Xen-based Host System Firewall and its Extension
ICECT '09 Proceedings of the 2009 International Conference on Electronic Computer Technology
NIDS: A Network Based Approach to Intrusion Detection and Prevention
IACSIT-SC '09 Proceedings of the 2009 International Association of Computer Science and Information Technology - Spring Conference
Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02
An Extensible and Virtualization-Compatible IDS Management Architecture
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02
Distributed Intrusion Detection in Clouds Using Mobile Agents
ADVCOMP '09 Proceedings of the 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences
Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine
ICCSN '10 Proceedings of the 2010 Second International Conference on Communication Software and Networks
On securing untrusted clouds with cryptography
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks
ICPPW '10 Proceedings of the 2010 39th International Conference on Parallel Processing Workshops
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
SRDS '10 Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
Self-similarity based lightweight intrusion detection method for cloud computing
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part II
A cloud-based intrusion detection and response system for mobile phones
DSNW '11 Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops
SP 800-145. The NIST Definition of Cloud Computing
SP 800-145. The NIST Definition of Cloud Computing
SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS)
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
A survey on security issues and solutions at different layers of Cloud computing
The Journal of Supercomputing
Administrative evaluation of intrusion detection system
Proceedings of the 2nd annual conference on Research in information technology
Improving cloud network security using the Tree-Rule firewall
Future Generation Computer Systems
Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Hi-index | 0.00 |
In this paper, we survey different intrusions affecting availability, confidentiality and integrity of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) in Cloud are examined. We recommend IDS/IPS positioning in Cloud environment to achieve desired security in the next generation networks.