2012 Ninth International Conference on Information Technology - New Generations 2012
DOI: 10.1109/itng.2012.97
|View full text |Cite
|
Sign up to set email alerts
|

CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(22 citation statements)
references
References 12 publications
0
22
0
Order By: Relevance
“…25 Experiments are conducted using CIDD. 21,22 Our implementation consists of two phases labelled, training phase and testing phase. In the training phase, Cloud is loaded with the two-third of intrusion detection dataset (named as training dataset).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…25 Experiments are conducted using CIDD. 21,22 Our implementation consists of two phases labelled, training phase and testing phase. In the training phase, Cloud is loaded with the two-third of intrusion detection dataset (named as training dataset).…”
Section: Resultsmentioning
confidence: 99%
“…Current dataset becomes unsuitable here due to the diverse operating systems of the virtual machines, the different range of consumers' requirements, and the size of data in cloud systems. So, a Log Analyzer and Correlator System (LACS) 21,22 has been employed to the logs that are obtained from the DARPA Intrusion Detection Evaluation Group of MIT Lincoln Laboratory to generate CIDD. This CIDD consists of both knowledge-based and behavior-based audit data that are gathered from UNIX and Windows users.…”
Section: Fig 1 Fuzzy Neural Networkmentioning
confidence: 99%
“…Service Level Agreement improves the quality of service being delivered in the cloud. Masquerade attack is one where an attacker assumes the detect this we need to move the data to different environments to increase its usability and keep safe from attackers [14].…”
Section: Literature Surveymentioning
confidence: 99%
“…al., in [26] discussed cloud intrusion detection dataset and masquerade attacks on cloud computing. Masquerades attack is one of the most serious attacks on cloud system because it has huge amount of resources.…”
Section: Literature Reviewmentioning
confidence: 99%