2020
DOI: 10.1007/s12065-020-00410-y
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…They defined evaluation criteria for digital forensic techniques in IaaS, PaaS, and SaaS models, identifying gaps that require further research. Tummalapalli and Chakravarthy [ 26 ] proposed an intrusion detection framework for cloud forensics based on a two-level gravitational group search-based support vector neural network classifier with clustering and a low false-positive rate. Purnaye and Kulkarni [ 27 ] proposed a more generic level taxonomy of cloud forensics solutions and strategies that would help researchers gain more knowledge in this field of study.…”
Section: Related Surveysmentioning
confidence: 99%
“…They defined evaluation criteria for digital forensic techniques in IaaS, PaaS, and SaaS models, identifying gaps that require further research. Tummalapalli and Chakravarthy [ 26 ] proposed an intrusion detection framework for cloud forensics based on a two-level gravitational group search-based support vector neural network classifier with clustering and a low false-positive rate. Purnaye and Kulkarni [ 27 ] proposed a more generic level taxonomy of cloud forensics solutions and strategies that would help researchers gain more knowledge in this field of study.…”
Section: Related Surveysmentioning
confidence: 99%
“…A progressing Cloud Security Alliance (CSA) research indicated that DDoS attacks are the common attacks on cloud security [4]. To illustrate, distinguished scientific works presented in [5][6][7][8][9] focused on creating a more distinguished phase to combat DDoS attacks.…”
Section: Figure 1: Classes Of Ddos Attackmentioning
confidence: 99%
“…Siva Rama Krishna Tummalapalli [15] develops and Bayesian fuzzy clustering and cluster search laid on support vector neural network based intrusion detection mechanism simulator for clustering and two-level classifiers works on cloud environment. "A cloud forensics tamperproof framework for cloud forensics is developed by author that is available in a cloud environment that is untrusted and multi-tenancy.…”
Section: Introductionmentioning
confidence: 99%
“…A model for improving security, which can be used in a cloud environment. Forensic preparedness is a way of maximizing the potential of an organization to respond to violations [15]. The below mention graph and table shows that number of paper published in various digital libraries like ACM,IEEE, ScienceDirect, Springer and Elsevier.…”
Section: Introductionmentioning
confidence: 99%