Detecting the run time attacks in the cloud with an evidence collection based approach.
Jie LinChuanyi LiuZhichun NingBinxing FangPublished in: CCIS (2014)
Keyphrases
- network intrusion detection systems
- cloud computing
- countermeasures
- detecting malicious
- malicious activities
- detect malicious
- empirical evidence
- evidential reasoning
- traffic analysis
- intrusion detection system
- data center
- automatic detection
- misuse detection
- malicious attacks
- insider threat
- image watermarking
- malicious users
- security risks
- database systems
- computer security
- computer systems
- digital libraries