25,849 research outputs found
Recommended from our members
A survey of intrusion detection techniques in Cloud
Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and integrity of Cloud resources and services. It examines proposals incorporating Intrusion Detection Systems (IDS) in Cloud and discusses various types and techniques of IDS and Intrusion Prevention Systems (IPS), and recommends IDS/IPS positioning in Cloud architecture to achieve desired security in the next generation networks
Sensor networks security based on sensitive robots agents. A conceptual model
Multi-agent systems are currently applied to solve complex problems. The
security of networks is an eloquent example of a complex and difficult problem.
A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion
Detection is introduced in the current paper. The proposed technique could be
used with machine learning based intrusion detection techniques. The new model
uses the reaction of virtual sensitive robots to different stigmergic variables
in order to keep the tracks of the intruders when securing a sensor network.Comment: 5 page
- …