Proceedings of the Doctoral Symposium of the 17th International Middleware Conference 2016
DOI: 10.1145/3009925.3009932
|View full text |Cite
|
Sign up to set email alerts
|

Distributed and cooperative intrusion detection in cloud networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…The proposed approach allows the exchange of security information between interconnected clouds. Ghribi [26] proposes a middleware IDS. The approach allows a cooperation between three layers: Hypervisor-based, Network-based, and VM-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed approach allows the exchange of security information between interconnected clouds. Ghribi [26] proposes a middleware IDS. The approach allows a cooperation between three layers: Hypervisor-based, Network-based, and VM-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…In the rest of this paper, we detail our proposed approach that extends our other works. 2,3 We discuss then the extension of the C-DIDS for fog/cloud computing environment in terms of full architecture, implementation environment and performance comparison.…”
Section: Fog-cloud Intrusion Detection Based Approachmentioning
confidence: 99%
“…This proposed approach is an extension of our other works. 2,3 With the integration of fog computing, in the proposed C-DIDS, there are two kinds of intrusion detection cooperation: cooperation between fog nodes and cooperation between fog computing and cloud computing technologies. It is evaluated in terms of false positive rate and detection delay and how the proposed C-DIDS contributes to secure the cloud environment.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, they enable the exchange of knowledge between interconnected clouds. Ghribi [6] proposed a middleware IDS. The approach enables a cooperation between cloud IDS layers: Hypervisorbased IDS, Network-based IDS and VM-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…The main limitation of existing cloud-based cooperative IDS (e.g. [4] [5] [6] [7] [8] [9]) is that they work under the assumption that all IDSs are trustable, which lets their collaboration systems vulnerable to untrusted (malicious or not) insiders.…”
Section: Introductionmentioning
confidence: 99%