2014
DOI: 10.1007/s13198-014-0277-7
|View full text |Cite
|
Sign up to set email alerts
|

HIDS: A host based intrusion detection system for cloud computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
54
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 107 publications
(61 citation statements)
references
References 9 publications
0
54
0
Order By: Relevance
“…Such abnormalities are recorded as logs in the IDS servers to prevent similar attacks on the network perimeter. The host IDS, on the contrary, is deployed on each individual host and the incoming and outgoing network traffic is monitored for abnormalities [3][4][5]. The existing data is compared with the previous data log and any discrepancies detected are reported to the administrator.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Such abnormalities are recorded as logs in the IDS servers to prevent similar attacks on the network perimeter. The host IDS, on the contrary, is deployed on each individual host and the incoming and outgoing network traffic is monitored for abnormalities [3][4][5]. The existing data is compared with the previous data log and any discrepancies detected are reported to the administrator.…”
Section: Introductionmentioning
confidence: 99%
“…These decisions require security expert personnel capable of the interpretation of system outputs and computing of crucial functions. Hence experienced security experts are required for the remediation, detection and management of such threats [3][4][5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Anomaly based [22] Specification based [23] Monitoring Method Network based [24] Host based [25] Behavior Pattern Passive and active IDS [26] …”
Section: Detection Methodsmentioning
confidence: 99%
“…The anomaly-based method identify attacker by comparing the action performed by the recent user to the standard user. In signature-based approach, the ongoing data traffic is monitored by different activities and compared with the rule set [Deshpande et al, (2018); Chiba et al (2019)]. In this research article, we presented an IDS system by using the advantages of nature inspired algorithm with ML approach.…”
Section: Ddos Attacksmentioning
confidence: 99%