2016
DOI: 10.1186/s13673-016-0076-z
|View full text |Cite
|
Sign up to set email alerts
|

A survey of cloud-based network intrusion detection analysis

Abstract: As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine learning and cloud computing technology to better identify threats and speed up computation times. This paper explores current research at the intersection of these two fields by examining cloud-based network intrusion detection approaches that utilize machine learning algorithms (MLAs). Specifically, we c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 82 publications
(38 citation statements)
references
References 54 publications
0
38
0
Order By: Relevance
“…Instead, it converts the ciphertexts encrypted with user A's public key into ciphertexts encrypted with that of user B. In this case, user A creates the re-encryption key and sends it to the proxy (2005) (Ateniese et al 2006;Blaze et al 1998;Hui and Sherratt 2017;Ivan and Dodis 2003;Keegan et al 2016;Maity and Park 2016).…”
Section: Proxy Re-encryptionmentioning
confidence: 99%
“…Instead, it converts the ciphertexts encrypted with user A's public key into ciphertexts encrypted with that of user B. In this case, user A creates the re-encryption key and sends it to the proxy (2005) (Ateniese et al 2006;Blaze et al 1998;Hui and Sherratt 2017;Ivan and Dodis 2003;Keegan et al 2016;Maity and Park 2016).…”
Section: Proxy Re-encryptionmentioning
confidence: 99%
“…This technology focus on the public IPv4 address, so that the number of subject IP is 3.702 billion which is excluding private and reserved IPv4 address spaces. The server was set up in the cloud environment to operate the collection system and measure the performance of processing traffic (Keegan et al 2016). Cloud server was used to deploy this collection system.…”
Section: Performance Of Collecting Device Informationmentioning
confidence: 99%
“…Between 2010 and 2015, around 80,000 vulnerabilities were newly registered in the major database known as the CVE (Common Vulnerability Enumeration) [1]. In recent years, the scope of security threats has also been expanded; i.e., IoT [2], Cloud [3], etc. The number of zero-day vulnerabilities has soared to the point that specialists can no longer be relied upon to respond to vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%