2013 Africon 2013
DOI: 10.1109/afrcon.2013.6757727
|View full text |Cite
|
Sign up to set email alerts
|

A collaborative intrusion detection and Prevention System in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…Most of port scan techniques give information about state of the targeted ports whereas other techniques give information about the service or the operating system. [7] Data collection is the basic part of the intrusion detection system, and the accuracy, reliability and effectiveness of the dataset directly affect the efficiency of detection. In this paper, we use logstash to collect log information from each virtual machine, and then store them into the elasticsearch cluster.…”
Section: Literature Surveymentioning
confidence: 99%
“…Most of port scan techniques give information about state of the targeted ports whereas other techniques give information about the service or the operating system. [7] Data collection is the basic part of the intrusion detection system, and the accuracy, reliability and effectiveness of the dataset directly affect the efficiency of detection. In this paper, we use logstash to collect log information from each virtual machine, and then store them into the elasticsearch cluster.…”
Section: Literature Surveymentioning
confidence: 99%
“…Hassani [36] combine IDS, IPS and hybrid detection techniques (pattern matching and anomaly detection) to address the issues of each individual approach. This effort focuses on distributed attacks coming through the infrastructure layer.…”
Section: ) Cloud Cluster -This Is Based On the Efficient Parallel VImentioning
confidence: 99%
“…The final layer of SPI model is the Infrastructure as a Service (IaaS). In IaaS, the user has to manage the resources such as storage, database and server [7]. The general architecture of cloud can be described as the authentication server, which authenticates the user, the second is a user, which uses the services and third is the servers that provide services to the user.…”
Section: Introductionmentioning
confidence: 99%