International Conference for Convergence for Technology-2014 2014
DOI: 10.1109/i2ct.2014.7092027
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised outlier detection technique for intrusion detection in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…However, several proposals convey just conceptual ideas without further proof of concept implementation or evaluation based on real data, including the following: [108,31,6,87,101,4,67,142,2,122,84].…”
Section: On Cloud Computing Intrusion Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, several proposals convey just conceptual ideas without further proof of concept implementation or evaluation based on real data, including the following: [108,31,6,87,101,4,67,142,2,122,84].…”
Section: On Cloud Computing Intrusion Detection Systemsmentioning
confidence: 99%
“…Neither of these methods take into account the special architectural features and dynamically changing characteristics of cloud computing environments. Examples of such work include [149,14,135,137,131,37,101,4,105,103,68,83,99,61,18,55,82,78,142,30,10,87,12,67,95,150,6,138,74,44,84,122,2,98,71,1,121]. Some of the proposals were developed using a simulation environment or conventional virtualization environment, which obviously miss crucial constraints underlying a real cloud environment [96,76,145,118,135,104,121,64,66,85].…”
Section: On Cloud Computing Intrusion Detection Systemsmentioning
confidence: 99%