2016
DOI: 10.1016/j.jnca.2016.08.016
|View full text |Cite
|
Sign up to set email alerts
|

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 199 publications
(70 citation statements)
references
References 99 publications
0
61
0
Order By: Relevance
“…If any how an attacker can hack traffic between users and IDM, he can get the credentials of the user and he can gain access to IDM server and cloud services [19,20,21]. Although it is not possible to save all the communication paths every time, yes, we can increase the difficulty level for attacker which can reduce the possibilities of attacks.…”
Section: Figure 3 Possibility Of Communication Path Compromise In Comentioning
confidence: 99%
“…If any how an attacker can hack traffic between users and IDM, he can get the credentials of the user and he can gain access to IDM server and cloud services [19,20,21]. Although it is not possible to save all the communication paths every time, yes, we can increase the difficulty level for attacker which can reduce the possibilities of attacks.…”
Section: Figure 3 Possibility Of Communication Path Compromise In Comentioning
confidence: 99%
“…The model was developed over NSL-KDD corpus. An intrusion classification for cloud services were put forward in [23]. The author proposed a cloud-based IDS.…”
Section: Related Workmentioning
confidence: 99%
“…Internet users often suffer from this attack, and since the cloud is web based, Cloud Clients are concerned as well. [2] 2.3 SQL Injection and Cross-Site Scripting :…”
Section: Phishing / Ingénierie Socialementioning
confidence: 99%