2019
DOI: 10.1007/s10586-019-03027-8
|View full text |Cite
|
Sign up to set email alerts
|

DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 23 publications
0
4
0
2
Order By: Relevance
“…[8]. Sandikaya and colleagues, focus The concept of Cyber Manufacturing Systems (CMS) represents an ambitious vision for the future of manufacturing.. [9] Mingtao Wu and his colleagues ,In this paper introduces the concept of CMS and highlights the growing threat of cyber-physical attacks in such systems [10].…”
Section: Literature Reviewmentioning
confidence: 99%
“…[8]. Sandikaya and colleagues, focus The concept of Cyber Manufacturing Systems (CMS) represents an ambitious vision for the future of manufacturing.. [9] Mingtao Wu and his colleagues ,In this paper introduces the concept of CMS and highlights the growing threat of cyber-physical attacks in such systems [10].…”
Section: Literature Reviewmentioning
confidence: 99%
“…A deep learning approach for proactive multi-cloud cooperative intrusion detection systems 2019 [14] A focus on future cloud: machine learning-based cloud security 2019 [15] A hybrid machine learning approach for malicious behavior detection and recognition in cloud computing 2020 [16] A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogenous client networks 2019 [17] An intrusion detection system for connected vehicles in smart cities 2019 [18] DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds 2020 [19] Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach 2021 [20] Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing 2020 [21] Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms 2019 [22] KVMInspector: KVM Based introspection approach to detect malware in cloud environment 2020 [23] Multilayer Self-Defense System to Protect Enterprise Cloud 2020 [24] Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN 2020 [25] TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection 2020 [26] Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning 2021 [27] A machine learning application for recducing the security risks in hybrid cloud networks 2020 [28]…”
Section: çAlışma Adı Yıl Referansmentioning
confidence: 99%
“…NS-3 ile toplanan veriler ağdaki kullanılan protokol, başlangıç zamanı, kaynak baytları ve hedef baytları gibi verileri içermektedir. [19] çalışmasında iş parçacıklarının CPU kullanımları ve kaynak erişimlerinin izlenmesi ile tespit işlemlerinin gerçekleşebileceğinden bahsedilmektedir. Veri olarak iş parçacıklarının anlık yaptıkları CPU paylaşımı, iş parçacıklarının kümülatif CPU paylaşımları, kritik kaynak erişim türü ve kritik kaynak erişim süresi kullanılmaktadır.…”
Section: B As2: Kullanilan Veri̇ Kümeleri̇ Ve öZelli̇kleri̇unclassified
See 1 more Smart Citation
“…Cloud computing as an innovative paradigm develops an environment to provide unlimited virtual applications and resources via the Internet, which are ubiquitously accessible, rapidly provisioned, customizable, and available on-demand [1]. Computing resources such as servers, storage, and computer networks are provided in four main forms, such as Software as a Service (SaaS) [2], Infrastructure as a Service (IaaS) [3], Platform as a Service (PaaS) [4], and Expert as a Service (EaaS) [5], [6]. In SaaS, the applications are deployed in the cloud and the cloud clients are allowed to access them through the Internet [7].…”
Section: Introductionmentioning
confidence: 99%