An Improved Hybrid Intrusion Detection System in Cloud Computing

@inproceedings{Gautam2012AnIH,
  title={An Improved Hybrid Intrusion Detection System in Cloud Computing},
  author={Ajeet kumar Gautam and Vidushi Sharma and Shiva Prakash},
  year={2012}
}
Today, security is a major concern. Cloud computing and Intrusion Detection and Prevention Systems are one such measure to mitigate these attacks. Different researchers have proposed different IDSs time to time some of these IDS's combine features of two or more IDSs which are called as Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS if an attacker… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Analysis of Virtualization Technologies for High Performance Computing Environments

2011 IEEE 4th International Conference on Cloud Computing • 2011
View 1 Excerpt

And Lee , “ a case for hardware protection of guest virtual machines from compromised hypervisors in cloud computing ”

Jakub Szefer, B. Ruby
2011

Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System

2011 Eighth International Conference on Information Technology: New Generations • 2011
View 1 Excerpt

Security issues and countermeasures in cloud computing

Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services • 2011
View 1 Excerpt

a case for hardware protection of guest virtual machines from compromised hypervisors in cloud computing

Jakub Szefer, B Ruby, Lee
International Conference On Distributed Computing Systems Workshops in Proc. in IEEE, • 2011
View 2 Excerpts

Notice of RetractionAn New Intrusion Prevention Attack System Model Based on Immune Principle

2010 2nd International Conference on E-business and Information System Security • 2010
View 2 Excerpts

Protecting the Confidentiality of Virtual Machines Against Untrusted Host

2010 International Symposium on Intelligence Information Processing and Trusted Computing • 2010
View 1 Excerpt

Cloud Application Architectures", O'reilly Media

Reese, George
2009
View 2 Excerpts

Cloud Computing: Implementation, Management, And Security" Available: http://lawlist.law.suffolk.edu/highlights/stuorgs/jhtl/book _reviews/2009_2010/Josh%20Matloff%20Book%20Revi ew.pdf

Rittinghouse, John
2009
View 1 Excerpt