Although cloud computing is considered the most widespread technology nowadays, it still suffers from many challenges, especially related to its security. Due to the open and distributed nature of the cloud environment, this makes the cloud itself vulnerable to various attacks. In this paper, the design of a novel integrated Cloud-based Intrusion Detection System (CIDS) is proposed to immunise the cloud against any possible attacks. The proposed CIDS consists of five main modules to do the following actions: monitoring the network, capturing the traffic flows, extracting features, analyzing the flows, detecting intrusions, taking a reaction, and logging all activities. Furthermore an enhanced bagging ensemble system of three deep learning m...
Security and availability are critical for cloud environments because their massive amount of resour...
Abstract: Cloud Computing is becoming popular day by day as many enterprise applications and data ar...
Cloud computing provides its user a lot of advantages but this technology has quite a bit of flaws a...
By impersonating legitimate users, intruders can use the abundant resources of cloud computing envir...
By impersonating legitimate users, intruders can use the abundant resources of cloud computing envir...
Today, many organizations are moving their computing services towards the Cloud. This makes their co...
Cloud Computing is a newly emerged technology. It is getting popularity day by day due to its amazin...
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm th...
With greater flexibility and less infrastructure investment, cloud computing offers end customers sc...
Cloud computing provide users a convenient, ubiquitous and on-demand network access to a shared pool...
The term Cloud computing is not new anymore in computing technology. This form of computing technolo...
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cl...
Along with the development of intrusion detection systems so far, remarkable results have been achie...
Cloud computing is considered to be the best technique for storing data online instead of using a ha...
The term Cloud computing is not new anymore in computing technology. This form of computing technolo...
Security and availability are critical for cloud environments because their massive amount of resour...
Abstract: Cloud Computing is becoming popular day by day as many enterprise applications and data ar...
Cloud computing provides its user a lot of advantages but this technology has quite a bit of flaws a...
By impersonating legitimate users, intruders can use the abundant resources of cloud computing envir...
By impersonating legitimate users, intruders can use the abundant resources of cloud computing envir...
Today, many organizations are moving their computing services towards the Cloud. This makes their co...
Cloud Computing is a newly emerged technology. It is getting popularity day by day due to its amazin...
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm th...
With greater flexibility and less infrastructure investment, cloud computing offers end customers sc...
Cloud computing provide users a convenient, ubiquitous and on-demand network access to a shared pool...
The term Cloud computing is not new anymore in computing technology. This form of computing technolo...
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cl...
Along with the development of intrusion detection systems so far, remarkable results have been achie...
Cloud computing is considered to be the best technique for storing data online instead of using a ha...
The term Cloud computing is not new anymore in computing technology. This form of computing technolo...
Security and availability are critical for cloud environments because their massive amount of resour...
Abstract: Cloud Computing is becoming popular day by day as many enterprise applications and data ar...
Cloud computing provides its user a lot of advantages but this technology has quite a bit of flaws a...