Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 22
Page No. 5939 - 5943

A Review: Analysis and Comparison of Different Detection Techniques of IDPS

Authors : Navjot Kamboj, Simar Saggu, Aditya Lamba and Meeta Singh

References

Armbrust, M., A.D. Joseph, R.H. Katz and D.A. Patterson, 2009. Above the clouds: A Berkeley view of cloud computing. MCs Thesis, EECS Department, University of California, Berkeley, California.

Ateniese, G., R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, 2007. Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29, 2007, Alexandria, Virginia, USA., pp: 598-609.

Brown, D.J., B. Suckow and T. Wang, 2002. A survey of intrusion detection systems. Ph.D Thesis, Department of Computer Science, University of California, San Diego, California.

Chen, Y., V. Paxson and R.H. Katz, 2010. What’s new about cloud computing security. Master Thesis, University of California, Berkeley Berkeley, California.

Guimaraes, M. and M. Murray, 2008. Overview of intrusion detection and intrusion prevention. Proceedings of the 5th Annual Conference on Information Security Curriculum Development, September 26-27, 2008, ACM, New York, USA., ISBN:978-1-60558-333-4, pp: 44-46.

Jabez, J. and B. Muthukumar, 2015. Intrusion Detection System (IDS): Anomaly detection using outlier detection approach. Procedia Comput. Sci., 48: 338-346.
Direct Link  |  

Janakiraman, R., M. Waldvogel and Q. Zhang, 2003. Indra: A peer-to-peer approach to network intrusion detection and prevention. Proceedings of the 12th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 11-11, 2003, IEEE, Washington, USA., ISBN:0-7695-1963-6, pp: 226-231.

Juels, A. and B.S. Kaliski Jr, 2007. PORs: Proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29-November 02, 2007, ACM, New York, USA, ISBN: 978-1-59593-703-2, pp: 584-597.

Liu, W., 2012. Research on cloud computing security problem and strategy. Proceedings of the International Conference on 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), April 21-23, 2012, IEEE, Wuhan, China, ISBN:978-1-4577-1415-3, pp: 1216-1219.

Ma, W., Z. Han, X. Li and J. Liu, 2016. A multi-level authorization based tenant separation mechanism in cloud computing environment. China Commun., 13: 162-171.
CrossRef  |  Direct Link  |  

Mell, P. and T. Grance, 2009. The NIST definition of cloud computing. National Inst. Standards Technol., 53: 20-50.

NIST., 2007. Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology, Gaithersburg, Maryland, USA.

Norton, M., 2004. Optimizing Pattern Matching for Intrusion Detection. Sourcefire Publisher, Columbia, Maryland,.

Patel, A., Q. Qassim and C. Wills, 2010. A survey of intrusion detection and prevention systems. Inf. Manage. Comput. Secur., 18: 277-290.
Direct Link  |  

Scarfone, K. and P. Mell, 2007. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST. Spec. Publ., 800: 94-127.
Direct Link  |  

Sen, J., 2013. Security and Privacy Issues in Cloud Computing. In: Architectures and Protocols for Secure Information Technology Infrastructures, Ruiz-Martinez, A. (Ed.). IGI Global, Dauphin, Pennsylvania, pp: 1-45.

Shabtai, A., Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev and C. Glezer, 2010. Google Android: A comprehensive security assessment. IEEE Security Privacy, 8: 35-44.
CrossRef  |  Direct Link  |  

Shibli, M.A. and S. Muftic, 2008. Intrusion detection and prevention system using secure mobile agents. Proceedings of the IEEE International Conference on Security and Cryptography, July 26-29, 2008, IEEE, Porto, Portugal, pp: 107-113.

Spafford, E., 1990. The Internet Worm Report. Purdue University, Florida, USA.,.

Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl., 34: 1-11.
CrossRef  |  

Tian, Z., W. Zhang, J. Ye, X. Yu and H. Zhang, 2008. Reduction of false positives in intrusion detection via adaptive alert classifier. Proceedings of the International Conference on Information and Automation, June 20-23, 2008, IEEE, Beijing, China, ISBN:978-1-4244-2183-1, pp: 1599-1602.

Zhou, C.V., C. Leckie and S. Karunasekera, 2010. A survey of coordinated attacks and collaborative intrusion detection. Comp. Security, 29: 124-140.
CrossRef  |  

Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future Gener. Comput. Syst., 28: 583-592.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved