• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Distributed Port-Scan Attack in Cloud Environment

Cached

  • Download as a PDF

Download Links

  • [tutorial.softcomputing.net]
  • [emoda05.softcomputing.net]
  • [www.softcomputing.net]
  • [wsc6.softcomputing.net]
  • [isda2002.softcomputing.net]
  • [isda2002m.softcomputing.net]
  • [isda04.softcomputing.net]
  • [isda05.softcomputing.net]
  • [isda01.softcomputing.net]
  • [ias04.softcomputing.net]
  • [isda2001.softcomputing.net]
  • [isda02.softcomputing.net]
  • [isda03.softcomputing.net]
  • [mario.softcomputing.net]
  • [wsc10.softcomputing.net]
  • [ngwsp.softcomputing.net]
  • [wsc9.softcomputing.net]
  • [isda.softcomputing.net]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Prachi Deshp , Aditi Aggarwal , S. C. Sharma , P. Sateesh Kumar , Ajith Abraham
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

Citations

109 Defending Against Flooding-Based Distributed Denial of Service Attacks : A Tutorial,” - Chang - 2002
45 Modeling Intrusion Detection System using Hybrid Intelligent Systems ”, - Pedabachigari, Abraham, et al. - 2007 (Show Context)

Citation Context

...g, Denial of service, root-kits,sport-scan, malwares [5-6]. An evolutionary design issproposed in [7] for intrusion detection. Further, in thissregard, an IDS using hybrid intelligence is proposed in =-=[8]-=-,swhich is helpful under variety of conditions. Further thesapproach in [8] is extended for the mobile computingsenvironment in [9] by Alvaro et.al. To improve thesperformance of public cloud monitori...

42 Addressing cloud computing security issues. Future Generation Computer Systems - Zissis, Lekkas - 2012 (Show Context)

Citation Context

...arious errors and the possible solution to set up a privatescloud.sSecurity in cloud computing is key aspect which is mostsdesired by a cloud user. Data privacy and security concernssare discussed in =-=[3]-=- with provision of trusted third party as assolution for providing security solutions. Intrusion detectionssystem (IDS) based approaches was proposed for cloudssecurity in [4].sMost general security a...

32 D-SCIDS: Distributed soft computing intrusion detection system - Abraham, Jain, et al.
32 Intrusion detection using ensemble of soft computing paradigms. - Mukkamala, Sung, et al. - 2003
30 Evolutionary Design of Intrusion Detection Programs,” - Abraham, C, et al. - 2007 (Show Context)

Citation Context

...sed for cloudssecurity in [4].sMost general security attacks in the cloudsenvironment includes flooding, Denial of service, root-kits,sport-scan, malwares [5-6]. An evolutionary design issproposed in =-=[7]-=- for intrusion detection. Further, in thissregard, an IDS using hybrid intelligence is proposed in [8],swhich is helpful under variety of conditions. Further thesapproach in [8] is extended for the mo...

17 Attack Surface: A Taxonomy for Attacks on Cloud Services”, - Gruschka, Jensen - 2010
14 Feature Deduction and Ensemble - Abraham, Thomas
14 Intrusion detection systems using adaptive regression splines. In: Seruca, - Mukkamala, Sung, et al. - 2004
13 MOVIH-IDS: A Mobile-Visualization Hybrid Intrusion Detection System. - Herrero, Corchado, et al. - 2009 (Show Context)

Citation Context

...her, in thissregard, an IDS using hybrid intelligence is proposed in [8],swhich is helpful under variety of conditions. Further thesapproach in [8] is extended for the mobile computingsenvironment in =-=[9]-=- by Alvaro et.al. To improve thesperformance of public cloud monitoring, a lightweightsmonitoring framework was proposed in [10].The articlesdiscussed various performance related issues in cloudscompu...

10 Surveying port scans and their detection methodologies, - Bhuyan, Bhattacharyya, et al. - 2011 (Show Context)

Citation Context

...cle, port-scan attack is evaluated. Basicsinformation about the user can be easily extracted by usingsit. The port-scan attack is classified as Horizontal port-scan,sVertical port-scan and block scan =-=[12]-=-.sThe Brute force port-scan and stealth scan attacks aresalso used for port-scanning. ‘Brute force’ scanners scan thesport in a sequential manner one after another for the rangesspecified by the user....

9 A survey of intrusion detection techniques in Cloud. - Modi, Patel, et al. - 2013 (Show Context)

Citation Context

...0].The articlesdiscussed various performance related issues in cloudscomputing and its security. Different type of intrusionsdetection systems in cloud with their limitations is nicelyscategorized in =-=[11]-=-.sThe Criminal psychology starts with the finding thesloopholes in the system. First step toward launching thesattack is to get the information about the system by portscanning. With the aid of port-s...

6 Hybrid Flexible Neural Tree Based Intrusion Detection Systems - Chen, Abraham, et al.
5 Intrusion Detection - Roschke, Cheng, et al. - 2009 (Show Context)

Citation Context

...oncernssare discussed in [3] with provision of trusted third party as assolution for providing security solutions. Intrusion detectionssystem (IDS) based approaches was proposed for cloudssecurity in =-=[4]-=-.sMost general security attacks in the cloudsenvironment includes flooding, Denial of service, root-kits,sport-scan, malwares [5-6]. An evolutionary design issproposed in [7] for intrusion detection. ...

4 Toward a lightweight framework for monitoring public clouds,” - Ma, Sun, et al. - 2012 (Show Context)

Citation Context

... thesapproach in [8] is extended for the mobile computingsenvironment in [9] by Alvaro et.al. To improve thesperformance of public cloud monitoring, a lightweightsmonitoring framework was proposed in =-=[10]-=-.The articlesdiscussed various performance related issues in cloudscomputing and its security. Different type of intrusionsdetection systems in cloud with their limitations is nicelyscategorized in [1...

3 issues cloud computing guidelines for managing security and privacy - Brown, “NIST - 2012 (Show Context)

Citation Context

...igurable computing resources (e.g.,snetworks, servers, storage, applications, and services) thatscan be rapidly provisioned and released with minimalsmanagement effort or service provider interaction =-=[1]-=-.sCloud computing refers to a collection of computing andscommunication resources that are shared by many differentsusers. It is considered as internet based computing servicesprovided by various infr...

1 Deployment of private cloud: Go through the errors first - Deshpande, Sharrna, et al. (Show Context)

Citation Context

...cesprovided by various infrastructure providers on an ondemand basis. It provides high performance computing forsmany data intensive and scientific applications with easysscalability. Deshpande et al =-=[2]-=- illustrated a collection ofsvarious errors and the possible solution to set up a privatescloud.sSecurity in cloud computing is key aspect which is mostsdesired by a cloud user. Data privacy and secur...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University