Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems.
Omar AchbarouMy Ahmed El KiramSalim El BouananiPublished in: Int. J. Interact. Multim. Artif. Intell. (2017)
Keyphrases
- cloud computing
- intrusion detection system
- network intrusion detection systems
- intrusion detection
- attack detection
- network attacks
- identity management
- network intrusions
- misuse detection
- intrusion prevention
- denial of service attacks
- computer security
- cyber attacks
- attack scenarios
- normal behavior
- malicious activities
- information security
- anomaly detection
- network security
- network traffic
- countermeasures
- network intrusion
- computer networks
- normal traffic
- network intrusion detection
- computing resources
- data management
- security issues
- data center
- cloud computing environment
- alert correlation
- security mechanisms
- service providers
- computer systems
- cyber security
- data mining
- dos attacks
- data privacy
- data mining techniques
- machine learning
- data sets
- personal information
- cloud computing platform