2016
DOI: 10.1016/j.bdr.2015.11.002
|View full text |Cite
|
Sign up to set email alerts
|

A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(34 citation statements)
references
References 7 publications
0
32
0
2
Order By: Relevance
“…In the event that system component such as the memory are compromised, there is need to develop detective mechanisms using reactive defense strategies. This is possible if the system incorporates neural networks and machine learning techniques [36].…”
Section: Big Data Testbed For Detecting Network Attacksmentioning
confidence: 99%
“…In the event that system component such as the memory are compromised, there is need to develop detective mechanisms using reactive defense strategies. This is possible if the system incorporates neural networks and machine learning techniques [36].…”
Section: Big Data Testbed For Detecting Network Attacksmentioning
confidence: 99%
“…Besides, most of the existing NSSA schemes use relational databases to store awareness data. Chen et al [6] proposed a cloud computing-based network monitoring and threat detection system, which utilized Hadoop MapReduce and Spark to process the data, and the results will be restored in the MySQL database server. The detector detected the malicious behavior of the data in the MySQL database and returned the detection results to the MySQL database.…”
Section: Introductionmentioning
confidence: 99%
“…C h e n et al [2] provided the highly secured critical infrastructure system and threat monitoring system to perform functions for health and security. X u et al [3], A h m a d et al [6], G r z o n k a et al [17] [47], L i et al [40], A l k h a n a k et al [25], W a n g et al [38], B i t t e n c o u r t and M a d e i r a [31], W u et al [10] and L i et al [40] formulated and solved the task scheduling problem on cloud computing system in modern distributed environments.…”
Section: Review Of Cloud Environmentmentioning
confidence: 99%
“…Z i n e d d i n e [50] worked on solving the vulnerabilities coverage and cost optimization. Cloud providers running task C h e n et al [2] Critical infrastructure & threat monitoring system X u et al [3]  -A h m a d et al [6]  -G r z o n k a et al [17]  -P a c i n i, M a t e o s and G a r i n o [20]  -…”
Section: O G H a D D A M R M O G H A D D A M And C H E R I E T [22]mentioning
confidence: 99%
See 1 more Smart Citation