Intrusion detection system in secure shell traffic in cloud environment
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade detection. Many traditional attack detection techniques have been prop...
| Main Authors: | Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Behzadi, Mostafa, Mahmod, Ramlan, Mustapha, Norwati |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/34251/ http://psasir.upm.edu.my/id/eprint/34251/1/34251.pdf |
Similar Items
Features selection for ids in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
Distributed Denial of Service detection using hybrid machine learning technique
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Features selection for IDS in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013)
by: Barati, Mehdi, et al.
Published: (2013)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Hierarchical secure virtualization model for cloud.
by: Manavi, Sina, et al.
Published: (2012)
by: Manavi, Sina, et al.
Published: (2012)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Implementation of secure email server in cloud environment
by: Madi, Nadim K. M., et al.
Published: (2012)
by: Madi, Nadim K. M., et al.
Published: (2012)
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018)
by: Al-Zarqawee, Aws Naser
Published: (2018)
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
KM-NEU: an efficient hybrid approach for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
Intrusion detection security system with IOT sensors
by: Chean, Vernon Lynn Chii
Published: (2021)
by: Chean, Vernon Lynn Chii
Published: (2021)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
by: Abdullah, Azizol, et al.
Published: (2024)
by: Abdullah, Azizol, et al.
Published: (2024)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Cost-effective traffic scheduling for Cloud resource management
by: Shareef, Zayd Ashraf Najeeb, et al.
Published: (2015)
by: Shareef, Zayd Ashraf Najeeb, et al.
Published: (2015)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Siren songs: a novel sonification method for network
traffic and intrusion detection
by: Skarth-Hayley, Luke
Published: (2017)
by: Skarth-Hayley, Luke
Published: (2017)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
Intrusion detection system with data mining approach: a review
by: Khalilian, Majdid, et al.
Published: (2011)
by: Khalilian, Majdid, et al.
Published: (2011)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
User-independent and self-optimizing intrusion detection framework for large database systems
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Similar Items
-
Features selection for ids in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013) -
Distributed Denial of Service detection using hybrid machine learning technique
by: Barati, Mehdi, et al.
Published: (2014) -
Features selection for IDS in encrypted traffic using genetic algorithm
by: Barati, Mehdi, et al.
Published: (2013) -
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012) -
Hierarchical secure virtualization model for cloud.
by: Manavi, Sina, et al.
Published: (2012)