Survey of intrusion detection techniques and architectures in cloud computing.
Pinki SharmaJyotsna SenguptaP. K. SuriPublished in: Int. J. High Perform. Comput. Netw. (2019)
Keyphrases
- intrusion detection
- cloud computing
- cloud computing platform
- intrusion detection system
- computing resources
- anomaly detection
- network security
- big data
- data center
- network traffic
- network intrusion detection
- data management
- cloud computing environment
- business models
- detecting anomalous
- cloud storage
- alert correlation
- information security
- data mining techniques
- computer security
- service providers
- data processing
- data mining
- network intrusions
- cyber security
- databases
- data collection
- information systems
- computing infrastructure
- computing paradigm
- security issues
- data sets
- intrusion prevention