A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach.
Chung-Huei LingWei-Fu HsienMin-Shiang HwangPublished in: Int. J. Netw. Secur. (2016)
Keyphrases
- intrusion detection
- cloud computing
- intrusion detection system
- cloud computing platform
- anomaly detection
- computing resources
- network security
- network traffic
- data center
- network intrusion detection
- service providers
- big data
- cloud computing environment
- data management
- information security
- business models
- data mining
- computer security
- network attacks
- data mining techniques
- security issues
- alert correlation
- intrusion prevention
- detecting anomalous
- cloud storage
- cyber security
- computing infrastructure
- cloud services
- data analysis
- real world
- databases
- database