2010 39th International Conference on Parallel Processing Workshops 2010
DOI: 10.1109/icppw.2010.46
|View full text |Cite
|
Sign up to set email alerts
|

A Cooperative Intrusion Detection System Framework for Cloud Computing Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
103
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 176 publications
(103 citation statements)
references
References 8 publications
0
103
0
Order By: Relevance
“…With a detection accuracy of close to 100% and a false alarm rate of close to 1%, the ID system proposed by [8] is able to detect HTTP anomalies at the SaaS layer. Research in [4] has demonstrated that the proposed IDP system is able to detect and prevent DoS and DDoS with 97% accuracy. Moreover, with a computation time per packet which is less than 0.003 seconds, this proposed IDP system is able to prevent the Cloud service from single point of failure attack.…”
Section: Comparison Of Far Idp System With Other Systemsmentioning
confidence: 99%
“…With a detection accuracy of close to 100% and a false alarm rate of close to 1%, the ID system proposed by [8] is able to detect HTTP anomalies at the SaaS layer. Research in [4] has demonstrated that the proposed IDP system is able to detect and prevent DoS and DDoS with 97% accuracy. Moreover, with a computation time per packet which is less than 0.003 seconds, this proposed IDP system is able to prevent the Cloud service from single point of failure attack.…”
Section: Comparison Of Far Idp System With Other Systemsmentioning
confidence: 99%
“…For this purpose new methods are being developed to detect attacks, when analysis is based on huge amounts of data. In this context, authors of [24] extend the basic IDS classification by adding the: Artificial neural network based IDS (ANN), Fuzzy logic based IDS, Association rule based IDS, Support Vector Machine (SVM) based IDS, and Genetic algorithm (GA) based IDS. The above mentioned IDS types are strictly related to techniques used for high volume data analysis for attack detection purposes.…”
Section: Intrusion Detection In Cloud Systemsmentioning
confidence: 99%
“…Chi-Chun Lo et al [8] proposed a cooperative intrusion detection system for dos attack in cloud. The proposed system is Distributed IDS and uses cooperative defense for each cloud environment by the IDSs.…”
Section: A Cooperative Intrusion Detection System Framework For Cloudmentioning
confidence: 99%