2016 International Conference on Inventive Computation Technologies (ICICT) 2016
DOI: 10.1109/inventive.2016.7830240
|View full text |Cite
|
Sign up to set email alerts
|

A survey on IDS and counter-measure excerption approach for detecting VM exposures in cloud environment-based on AODV protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…It looks NIDS might be finest solution for cloud environment, but using NIDS has severe troubles. The most important problem, when using NIDS for observing is the encrypted data [8]. Providing safe and consistent service assertion is quiet important.…”
Section: Intrusion Detection System In Vmmentioning
confidence: 99%
See 1 more Smart Citation
“…It looks NIDS might be finest solution for cloud environment, but using NIDS has severe troubles. The most important problem, when using NIDS for observing is the encrypted data [8]. Providing safe and consistent service assertion is quiet important.…”
Section: Intrusion Detection System In Vmmentioning
confidence: 99%
“…A virtual utilization discharges some of the distinguished management issues because; most of the software updates, maintenance, configuration and other management tasks are automated and integrated at the data center by the cloud provider. Virtualization techniques also experiences security issues for the network such as cloud [8].…”
Section: Introductionmentioning
confidence: 99%