2016
DOI: 10.1016/j.procs.2016.04.249
|View full text |Cite
|
Sign up to set email alerts
|

A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(26 citation statements)
references
References 4 publications
0
26
0
Order By: Relevance
“…If an attack was found in a layer, it cannot be executed in the other layers. Chiba et al [27] also propose a network-based cooperative IDS to identify network attacks in the cloud environment, which is performed by monitoring traffic while maintaining performance and service quality. Recently, Wahab et al [28,29] propose a game theoretic-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…If an attack was found in a layer, it cannot be executed in the other layers. Chiba et al [27] also propose a network-based cooperative IDS to identify network attacks in the cloud environment, which is performed by monitoring traffic while maintaining performance and service quality. Recently, Wahab et al [28,29] propose a game theoretic-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…In this way anomaly-based approach is able to detect zero-day attacks but results in high false positive rates (FPR) because deviation from normal behavior may not always leads to attack. There exists another detection approach called hybrid approach [31], [36] which combined the two approaches. With hybrid IDS , first, known attacks are detected and separated by matching with the attack signatures and then among the remaining stream the unknown attacks are detected by observing deviations of such packet features from those of the normal packets.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…The authors stress that the main research challenges are alert correlation algorithms and CIDS architectures that were categorised into centralised architecture, hybrid architecture and fully distributed architecture, which are similar to the deployment models of C3ISP infrastructure. For instance, two works [34] [35] proposed using CIDS to detect DDoS attacks for Cloud Computing, whereby one region's IDS can share its alert data with the other IDS systems. This helps to reduce computational cost for detecting the same attacks at other IDS systems and therefore improves detection rate in overall cloud environment.…”
Section: B Cti Data Sharing For Collaborative Analysismentioning
confidence: 99%
“…This helps to reduce computational cost for detecting the same attacks at other IDS systems and therefore improves detection rate in overall cloud environment. The difference is the paper [34] rides on the fully distributed architecture while the paper [35] uses the hybrid architecture.…”
Section: B Cti Data Sharing For Collaborative Analysismentioning
confidence: 99%