+

Li et al., 2012 - Google Patents

A distributed intrusion detection model based on cloud theory

Li et al., 2012

Document ID
3072164267047498320
Author
Li H
Wu Q
Publication year
Publication venue
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems

External Links

Snippet

Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over the time. Distributed attacks could not be detected …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Kumar et al. A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing
Banerjee et al. A blockchain future for internet of things security: a position paper
Wani et al. SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
Wang et al. SkyShield: A sketch-based defense system against application layer DDoS attacks
Barach Towards Zero Trust Security in SDN: A Multi-Layered Defense Strategy
Om Kumar et al. Detecting and confronting flash attacks from IoT botnets
Modi et al. A survey of intrusion detection techniques in cloud
US10348739B2 (en) Automated data risk assessment
Rizvi et al. Application of artificial intelligence to network forensics: Survey, challenges and future directions
Ho et al. Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
Wang Big data in intrusion detection systems and intrusion prevention systems
Albayati et al. Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system
Sree et al. HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce
Dhir et al. Study of machine and deep learning classifications in cyber physical system
Adler et al. Using machine learning for behavior-based access control: Scalable anomaly detection on tcp connections and http requests
Bawa et al. Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments
Li et al. A distributed intrusion detection model based on cloud theory
Salih et al. Cyber security: performance analysis and challenges for cyber attacks detection
Stiawan et al. Characterizing network intrusion prevention system
Jouad et al. Security challenges in intrusion detection
Seo et al. Abnormal behavior detection to identify infected systems using the APChain algorithm and behavioral profiling
Niu Design of automatic monitoring system for network information security in cloud computing environment
Alnatsheh et al. Machine learning-based approach for detecting ddos attack in sdn
CN117955729A (en) A method, device and electronic device for detecting malicious software based on flow
Halabi et al. How to evaluate the defense against dos and ddos attacks in cloud computing: a survey and taxonomy
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载