A feasible approach to intrusion detection in virtual network layer of Cloud computing
暂无分享,去创建一个
[1] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[2] Irfan Gul,et al. Distributed Cloud Intrusion Detection Model , 2011 .
[3] Shubhangi L. Vaikole,et al. Intrusion Detection System in Cloud Computing Environment , 2012 .
[4] C. N. Modi,et al. Bayesian Classifier and Snort based network intrusion detection system in cloud computing , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).
[5] Ayush Sharma,et al. Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.
[6] D. S. Yeung,et al. Comparison of different fusion approaches for network intrusion detection using ensemble of RBFNN , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[7] Ajith Abraham,et al. A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment , 2013, Int. J. Distributed Sens. Networks.
[8] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[9] Chi-Chun Lo,et al. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.
[10] Santosh Biswas,et al. Towards reducing false alarms in network intrusion detection systems with data summarization technique , 2013, Secur. Commun. Networks.
[11] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[12] Christoph Meinel,et al. An Extensible and Virtualization-Compatible IDS Management Architecture , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[13] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[14] P. S. Avadhani,et al. A comparison of data mining techniques for intrusion detection , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).
[15] Mahmod S. Mahmod,et al. A COMPARISON STUDY FOR INTRUSION DATABASE (KDD99, NSL-KDD) BASED ON SELF ORGANIZATION MAP (SOM) ARTIFICIAL NEURAL NETWORK , 2013 .
[16] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[17] R. Chitra,et al. Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .
[18] R. Geetha Ramani,et al. Discriminant Analysis based Feature Selection in KDD Intrusion Dataset , 2011 .
[19] Jianquan Ouyang,et al. Network Intrusion Detection Model based on Fuzzy Support Vector Machine , 2013, J. Networks.
[20] Yi Yu,et al. An Attribute-weighted Clustering Intrusion Detection Method , 2013, J. Networks.
[21] Muttukrishnan Rajarajan,et al. Framework for distributed and self-healing hybrid intrusion detection and prevention system , 2013, 2013 International Conference on ICT Convergence (ICTC).
[22] Shailendra Singh,et al. An ensemble approach for feature selection of Cyber Attack Dataset , 2009, ArXiv.
[23] Fabrizio Baiardi,et al. CIDS: A Framework for Intrusion Detection in Cloud Systems , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[24] Sudhir N. Dhage,et al. Intrusion detection system in cloud computing environment , 2012, Int. J. Cloud Comput..
[25] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[26] Muttukrishnan Rajarajan,et al. A novel framework for intrusion detection in cloud , 2012, SIN '12.
[27] Stephen Biggs,et al. Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[28] Kagan Tumer,et al. Classifier ensembles: Select real-world applications , 2008, Inf. Fusion.
[29] Malcolm I. Heywood,et al. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.
[30] Dhiren R. Patel,et al. A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[31] Roberto Bifulco,et al. Integrating a network IDS into an open source Cloud Computing environment , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[32] Muttukrishnan Rajarajan,et al. Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing , 2012 .
[33] Sanjay Ram. Secure cloud computing based on mutual intrusion detection system , 2012 .
[34] Kamalrulnizam Abu Bakar,et al. Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.