2013 2nd National Conference on Information Assurance (NCIA) 2013
DOI: 10.1109/ncia.2013.6725325
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System in Cloud Computing: Challenges and opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…The cloud user is in charge of monitoring HIDS deployed on a VM, while the cloud provider is in charge of HIDS deployment on the cloud [42].…”
Section: ) Network-based Intrusion Detection Systems (Nids)mentioning
confidence: 99%
“…The cloud user is in charge of monitoring HIDS deployed on a VM, while the cloud provider is in charge of HIDS deployment on the cloud [42].…”
Section: ) Network-based Intrusion Detection Systems (Nids)mentioning
confidence: 99%
“…2) Centralized: a command and control center in the cloud monitors the mobile devices. In-depth analyses are performed on powerful servers, taking advantage of their abundant computation power and memory capacity [6], [19]- [23]. 3) Distributed: the system is partly deployed on the mobile device and partly within the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…IoT and Cloud Computing technologies to produce a large volume of traffic attack over 665 GB/s [8][9].…”
Section: Figure1 Cloud Computing Stackmentioning
confidence: 99%