2016 Third International Conference on Systems of Collaboration (SysCo) 2016
DOI: 10.1109/sysco.2016.7831341
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection in cloud computing based attacks patterns and risk assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Security researchers need to have a seamless mechanism to integrate and analyze various information generated by heterogeneous sources implemented in cloud environment with the aim to detect intrusion and reduce false positive alerts. [1] Kleber, schulter et al [2] have proposed an IDS service at cloud middleware layer with an audit system designed to cover attacks that Network IDS and Host IDS cannot detect. In [3] authors presented an approach of detection using five major classifiers to characterize the nature of an attack, classification by attack vector, attack target, operational impact, informational impact and by defense, which provide the network administrator with information of how to mitigate an attack.…”
Section: Related Workmentioning
confidence: 99%
“…Security researchers need to have a seamless mechanism to integrate and analyze various information generated by heterogeneous sources implemented in cloud environment with the aim to detect intrusion and reduce false positive alerts. [1] Kleber, schulter et al [2] have proposed an IDS service at cloud middleware layer with an audit system designed to cover attacks that Network IDS and Host IDS cannot detect. In [3] authors presented an approach of detection using five major classifiers to characterize the nature of an attack, classification by attack vector, attack target, operational impact, informational impact and by defense, which provide the network administrator with information of how to mitigate an attack.…”
Section: Related Workmentioning
confidence: 99%
“…For example, the authors of [4], [5], and [6] introduced solutions to detect DoS attacks. Alternatively, one can also rely on attacks' patterns and risk assessment [9], game theory [10], and supervised learning [11] to detect and counter cyber threats. The common limitation of these methods is the relatively low accuracy in detecting cyberattacks, and they are unable to work effectively in real-time cloud systems with different types of attacks.…”
Section: Introductionmentioning
confidence: 99%