A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets.

作者: Nik Zulkarnaen Bin Khidzir , Aws Naser Jaber , Mohammed Anbar , Shahid Anwar

DOI:

关键词:

摘要:

参考文章(123)
Aleksandar Toshevski, Mitko Bogdanoski, Dimitar Bogatinov, Marjan Bogdanoski, A novel approach for mitigating the effects of the TCP SYN flood DDoS attacks World Academic Press, World Academic Union. ,(2016)
Komal Ramteke, Swati Ramteke, Rajesh Dongare, Rajiv Gandhi, Intrusion Detection System for Cloud Network Using FC-ANN Algorithm ,(2013)
Antonio Celesti, Davide Mulfari, Maria Fazio, Antonio Puliafito, Massimo Villari, Evaluating alternative DaaS solutions in private and public OpenStack Clouds Software - Practice and Experience. ,vol. 47, pp. 1185- 1200 ,(2017) , 10.1002/SPE.2498
Gagandeep Kaur, Vikas Saxena, J.P. Gupta, Detection of TCP targeted high bandwidth attacks using self-similarity Journal of King Saud University - Computer and Information Sciences. ,vol. 32, pp. 35- 49 ,(2017) , 10.1016/J.JKSUCI.2017.05.004
Pezhman Sheinidashtegol, Michael Galloway, Performance Impact of DDoS Attacks on Three Virtual Machine Hypervisors 2017 IEEE International Conference on Cloud Engineering (IC2E). pp. 204- 214 ,(2017) , 10.1109/IC2E.2017.18
Pulkit Suhasaria, Ankit Garg, Ashwani Agarwal, Selvakumar K, Distributed Denial of Service Attacks: A Survey Imperial journal of interdisciplinary research. ,vol. 3, ,(2017)
Vishal V. Mahale, Nikita P. Pareek, Vrushali U. Uttarwar, Alleviation of DDoS attack using advance technique international conference on innovative mechanisms for industry applications. pp. 172- 176 ,(2017) , 10.1109/ICIMIA.2017.7975595
Mohammed Samaka, Deval Bhamare, Raj Jain, Aiman Erbad, Tara Salman, Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments international conference on cyber security and cloud computing. pp. 97- 103 ,(2017) , 10.1109/CSCLOUD.2017.15
Sanchika Gupta, Padam Kumar, VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud international symposium on security in computing and communication. pp. 255- 261 ,(2013) , 10.1007/978-3-642-40576-1_25