Implementing Hy-IDS, Mobiles Agents and Virtual Firewall to Enhance the Security in IaaS Cloud.
Hicham ToumiFatima Zahra FagroudAmiyne ZakouniMohamed TaleaPublished in: EUSPN/ICTH (2019)
Keyphrases
- intrusion detection
- cloud computing
- intrusion detection system
- network security
- security issues
- multi agent systems
- cloud computing environment
- multi agent
- data center
- cloud storage
- network traffic
- virtual characters
- intelligent agents
- anomaly detection
- intrusion prevention
- multiple agents
- autonomous agents
- virtual environment
- cooperative
- information security
- virtual reality
- software agents
- cloud services
- multiagent systems
- unauthorized access
- security enforcement
- security architecture
- java card
- access control
- virtual machine
- computing infrastructure
- role assignment
- security risks
- agent model
- security mechanisms
- resource allocation
- security policies
- electronic institutions
- augmented reality
- service providers
- dynamic environments
- data management
- virtual machine monitor
- attack scenarios
- data mining
- security threats
- virtual space
- business models
- mobile agents
- virtual world
- data mining techniques
- decision making
- sensitive data
- statistical databases
- agent architecture
- electronic commerce
- operating system