2018
DOI: 10.1016/j.procs.2018.01.095
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
46
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 114 publications
(46 citation statements)
references
References 11 publications
0
46
0
Order By: Relevance
“…Distributed machine learning based IDS has been proposed by Idhammad et al for cloud environment [24]. The preprocessed data is used by anomaly detection module which uses NB classifier for separating the network traffic data into normal or abnormal traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Distributed machine learning based IDS has been proposed by Idhammad et al for cloud environment [24]. The preprocessed data is used by anomaly detection module which uses NB classifier for separating the network traffic data into normal or abnormal traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Idhammad, Afdel and Belouch, [27], implemented a distributed intrusion detection system for Cloud environments. At first, they used the Naive Bayes model for anomaly detection and data preprocessing and then, for the multi-classification, they used a classifier based on Random Forest, that detects the type of each attack.…”
Section: Related Workmentioning
confidence: 99%
“…Different techniques and strategies to resolve IDS shortcomings such as high false alert rates, poor reliability, and time consuming have been introduced in recent decades. A Hybrid Intrusion Identification (HII) method [19] based on DT and KNN is proposed in this paper. A functional selection method is used to extract structured information from NSL-KDD data set to improve the performance of the proposed approach.…”
Section: Literature Surveymentioning
confidence: 99%