Nothing Special   »   [go: up one dir, main page]

Mumtaz et al., 2022 - Google Patents

PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing.

Mumtaz et al., 2022

View PDF
Document ID
1398612768969403441
Author
Mumtaz R
Samawi V
Alhroob A
Alzyadat W
Almukahel I
Publication year
Publication venue
International Journal of Advances in Soft Computing & Its Applications

External Links

Snippet

Cloud computing faces numerous challenges in many areas including security and privacy issues. In this work, a developed approach is suggested to tackle three security and privacy issues: network intrusion detection (NID), privacy, and internal attacks. A decision tree (J48) …
Continue reading at www.i-csrs.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
AlAhmad et al. Mobile cloud computing models security issues: A systematic review
Borky et al. Protecting information with cybersecurity
Johnson et al. Guide to cyber threat information sharing
Alghofaili et al. Secure cloud infrastructure: A survey on issues, current solutions, and open challenges
Alhassan et al. Information security in an organization
Kalloniatis et al. Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
Sam BALANCING CYBERSECURITY AFTER THE PANDEMIC (Tips and Tricks)
Viega Building security requirements with CLASP
Omotunde et al. A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond
Priyadarshini Introduction on cybersecurity
Malomo et al. Security through block vault in a blockchain enabled federated cloud framework
Corno et al. Helping novice developers harness security issues in cloud-IoT systems
Asaad et al. A Cyber Security Threats, Vulnerability, Challenges and Proposed Solution
Mishra et al. Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework
Mumtaz et al. PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing.
Pavana et al. Zero trust model: A compelling strategy to strengthen the security posture of IT organizations
ALQAHTANI et al. REVIEWING OF CYBERSECURITY THREATS, ATTACKS, AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENT
Hasan et al. Threat model and security analysis of video conferencing systems as a communication paradigm during the COVID-19 pandemic
Ramirez A Framework to Build Secure Microservice Architecture
Tai Ramirez A Framework To Build Secure Microservice Architecture
Vumo et al. A data security framework for cloud computing adoption: Mozambican government cloud computing
Alotaibi et al. Sensitive data exposure: data forwarding and storage on cloud environment
Hussain et al. Survey on security and privacy of cloud computing paradigm: Challenges and mitigation methods
NEVO et al. Securing AI Model Weights
Kolhar et al. Cloud Computing Data Auditing Algorithm