• Aucun résultat trouvé

Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds

N/A
N/A
Protected

Academic year: 2021

Partager "Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds"

Copied!
191
0
0

Texte intégral

Loading

Figure

Table 4.2 Attack detection rates when granting resources (CPU, Memory, I/O and Network) to VMs.
Table 4.3 Cloud-based Detection Approaches.
Figure 4.1 Architecture of the Proposed Framework
Figure 4.2 The value of w affects the position of the hyperplane.
+7

Références

Documents relatifs

The most important system features of developed and partially implemented M-AHIDS are integration of the several anomaly detection tech- niques in a form of agent, machinery of

the output of the detection modules (e.g. it informs the user or a central system) and stores other information such as the alert database. Finally, the detection module detects

As a result, our analysis technique allows overcoming common restrictions in previous work such as unexpected runtime errors in the Java Virtual Machine (JVM) or applications

The proposed intrusion detection systems considers a general type of an attack scenario where malicious packets are injected into a SCADA network system composed of a

However IaaS clouds features, such as multi-tenancy and elasticity, generate new security vulnerabilities [1] for which the security monitoring must be partly run by the cloud

Probe index Spectrogram Processed spectrogram Loss function for autoencoder learning 4-norm distance Reconstruction error Error time series Detection threshold Cumulative

small

This paper presents an intrusion detection system based on the model of the human immune system and which will use the artificial immune systems paradigm.. Furthermore