Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods.
Amira BradaiHossam AfifiPublished in: CyberC (2012)
Keyphrases
- intrusion detection
- cloud computing
- intrusion detection system
- big data
- computing resources
- cloud computing environment
- data management
- anomaly detection
- network security
- data center
- information systems
- open source
- network intrusion detection
- cloud computing platform
- database
- high detection rate
- security issues
- data mining techniques
- feature selection
- data mining
- data sets