AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud.
Kahina LazriSylvie LaniepceHaiming ZhengJalel Ben-OthmanPublished in: UCC (2014)
Keyphrases
- resource consumption
- attack detection
- cloud computing
- multistage
- data center
- resource allocation
- intrusion detection system
- solution quality
- data management
- data transfer
- response time
- query execution
- cyber attacks
- user profiles
- scheduling algorithm
- virtual machine
- product recommendation
- quality of service
- processing times
- intrusion detection
- computational efficiency
- optimal policy
- cost model
- data processing