A Survey on Intrusion Detection Systems for Cloud Computing Environment
暂无分享,去创建一个
[1] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[2] Lei Li,et al. A novel rule-based Intrusion Detection System using data mining , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[3] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[4] R. Chitra,et al. Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .
[5] Carlos Gershenson,et al. Artificial Neural Networks for Beginners , 2003, ArXiv.
[6] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[7] Chi Cheng,et al. Extreme learning machines for intrusion detection , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).
[8] Venus W. Samawi,et al. One-rule Genetic-Fuzzy classifier , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[9] Christoph Meinel,et al. Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[10] Wanlei Zhou,et al. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..
[11] Idris Bharanidharan Shanmugam,et al. Hybrid intelligent Intrusion Detection System , 2005 .
[12] Hervé Debar,et al. The Intrusion Detection Message Exchange Format (IDMEF) , 2007, RFC.
[13] Hu Zhengbing,et al. A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining , 2008, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008).
[14] Tianrui Li,et al. Intrusion detection system based on new association rule mining model , 2005, 2005 IEEE International Conference on Granular Computing.
[15] A. D. Gawande,et al. INTRUSION DETECTION SYSTEM FOR CLOUD COMPUTING , 2012 .
[16] Min-Woo Park,et al. Multi-level Intrusion Detection System and log management in Cloud Computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[17] Yizhang Guan,et al. A CP Intrusion Detection Strategy on Cloud Computing , 2009 .
[18] Weiqing Sun,et al. Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[19] Pratit Santiprabhob. Fuzzy Intrusion Detection System , 2002 .
[20] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[21] L. Ibrahim. ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .
[22] K. Anand,et al. Genetic Algorithm Approach to Intrusion Detection System , 2012 .
[23] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[24] Chi-Chun Lo,et al. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.
[25] Rossouw von Solms,et al. The utilization of artificial intelligence in a hybrid intrusion detection system , 2002 .
[26] Shubhangi L. Vaikole,et al. Intrusion Detection System in Cloud Computing Environment , 2012 .
[27] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[28] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[29] Salim Hariri,et al. An efficient network intrusion detection method based on information theory and genetic algorithm , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[30] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[31] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[32] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[33] Anup Goyal,et al. GA-NIDS : A Genetic Algorithm based Network Intrusion Detection System , 2007 .
[34] Qing-Wei Liu,et al. Intrusion scenarios detection based on data mining , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[35] Animesh Kumar,et al. Zero Day Exploit , 2014 .
[36] Mehdi MORADI,et al. A Neural Network Based System for Intrusion Detection and Classification of Attacks , 2004 .
[37] Kamalrulnizam Abu Bakar,et al. Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.
[38] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[39] D. Mudzingwa,et al. A study of methodologies used in intrusion detection and prevention systems (IDPS) , 2012, 2012 Proceedings of IEEE Southeastcon.
[40] Khaled Salah,et al. EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.
[41] Gouda I. Salama,et al. Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System , 2009 .
[42] Li-Yong Ren,et al. Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[43] Zhi Wang,et al. DKSM: Subverting Virtual Machine Introspection for Fun and Profit , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[44] Brahim Belhaouari Samir,et al. An approach towards intrusion detection using PCA feature subsets and SVM , 2012, 2012 International Conference on Computer & Information Science (ICCIS).
[45] S VivinSandar,et al. Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks , 2012 .
[46] Angelos D. Keromytis,et al. Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.
[47] Patrick Martin,et al. IDSaaS: Intrusion Detection System as a Service in Public Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).