2013 47th International Carnahan Conference on Security Technology (ICCST) 2013
DOI: 10.1109/ccst.2013.6922049
|View full text |Cite
|
Sign up to set email alerts
|

Review on state of art intrusion detection systems designed for the cloud computing paradigm

Abstract: Cloud Computing is an emerging technology that enhances capability, usability and scalability of computer systems. On account of some exclusive features, cloud computing system always differs from the traditional computer system; not only the capabilities but also the vulnerabilities and threats. Intrusion Detection System (IDS) is a significant component of computer system security and compliance practices that protects computer systems from various types of malicious activities and attacks. Intrusion Detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 20 publications
0
4
0
2
Order By: Relevance
“…Google mengembangkan layanan berbayar bernama Cloud IDS yang berbasis cloud-native dengan biaya sewa $1.5 setiap jam pengawasan dari setiap endpoint yang diawasi dan $0.07 untuk setiap Gigabyte data yang dianalisis dan diproses [16]…”
Section: Pendahuluanunclassified
“…Google mengembangkan layanan berbayar bernama Cloud IDS yang berbasis cloud-native dengan biaya sewa $1.5 setiap jam pengawasan dari setiap endpoint yang diawasi dan $0.07 untuk setiap Gigabyte data yang dianalisis dan diproses [16]…”
Section: Pendahuluanunclassified
“…NIDS performs an analysis of the network traffic via the network's transport layer and network layer to detect the intrusions signs like Denial-of-Service (DoS) attacks and port scans. 155 The IDS should be placed somewhere with complete network traffic monitor visibility. 156 Modi et al 106 combined a signature apriori-depended NIDS to cloud.…”
Section: Network-based Intrusion Detection Systems (Nids)mentioning
confidence: 99%
“…HIDS is nominated as distributed IDS (DIDS). 155 HIDS uses two or more techniques for intrusion detection. It includes numerous intrusions detection procedures (e.g., NIDS, HIDS) within a vast network, the whole of which link together or through a central server that conducts network monitoring.…”
Section: Hybrid Intrusion Detection Systems (Hids)mentioning
confidence: 99%
“…Computer systems monitor and control a myriad of physical processes, and their protection against random errors, deliberate intrusions (e.g., Denning, 1987;Debar et al, 1999;Cárdenas et al, 2011;Premathilaka et al, 2013; and references therein), false data injections (e.g., Liang, 2017; and references therein), and other disruptors has become of much interest. A number of sophisticated methods have been suggested in the literature for tackling such problems, including probabilistic (e.g., Huang et al, 2016;Onoda, 2016), deep learning (e.g., He et al, 2017), and artificial neural networks based methods (e.g., Potluri, 2017), to name a few.…”
Section: Introductionmentioning
confidence: 99%