Mumtaz et al., 2022 - Google Patents
PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing.Mumtaz et al., 2022
View PDF- Document ID
- 1398612768969403441
- Author
- Mumtaz R
- Samawi V
- Alhroob A
- Alzyadat W
- Almukahel I
- Publication year
- Publication venue
- International Journal of Advances in Soft Computing & Its Applications
External Links
Snippet
Cloud computing faces numerous challenges in many areas including security and privacy issues. In this work, a developed approach is suggested to tackle three security and privacy issues: network intrusion detection (NID), privacy, and internal attacks. A decision tree (J48) …
- 238000001514 detection method 0 abstract description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AlAhmad et al. | Mobile cloud computing models security issues: A systematic review | |
Borky et al. | Protecting information with cybersecurity | |
Johnson et al. | Guide to cyber threat information sharing | |
Alghofaili et al. | Secure cloud infrastructure: A survey on issues, current solutions, and open challenges | |
Alhassan et al. | Information security in an organization | |
Kalloniatis et al. | Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts | |
Sam | BALANCING CYBERSECURITY AFTER THE PANDEMIC (Tips and Tricks) | |
Viega | Building security requirements with CLASP | |
Omotunde et al. | A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond | |
Priyadarshini | Introduction on cybersecurity | |
Malomo et al. | Security through block vault in a blockchain enabled federated cloud framework | |
Corno et al. | Helping novice developers harness security issues in cloud-IoT systems | |
Asaad et al. | A Cyber Security Threats, Vulnerability, Challenges and Proposed Solution | |
Mishra et al. | Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework | |
Mumtaz et al. | PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing. | |
Pavana et al. | Zero trust model: A compelling strategy to strengthen the security posture of IT organizations | |
ALQAHTANI et al. | REVIEWING OF CYBERSECURITY THREATS, ATTACKS, AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENT | |
Hasan et al. | Threat model and security analysis of video conferencing systems as a communication paradigm during the COVID-19 pandemic | |
Ramirez | A Framework to Build Secure Microservice Architecture | |
Tai Ramirez | A Framework To Build Secure Microservice Architecture | |
Vumo et al. | A data security framework for cloud computing adoption: Mozambican government cloud computing | |
Alotaibi et al. | Sensitive data exposure: data forwarding and storage on cloud environment | |
Hussain et al. | Survey on security and privacy of cloud computing paradigm: Challenges and mitigation methods | |
NEVO et al. | Securing AI Model Weights | |
Kolhar et al. | Cloud Computing Data Auditing Algorithm |