[go: up one dir, main page]

Sangui et al., 2021 - Google Patents

Cloud security using honeypot network and blockchain: a review

Sangui et al., 2021

Document ID
9127344121763664408
Author
Sangui S
Ghosh S
Publication year
Publication venue
Machine learning techniques and analytics for cloud security

External Links

Snippet

Cloud technology has revolutionized the domain of computing in recent years. The cloud has succeeded to attract many businesses to use cloud resources or host most of their data in the cloud with their reduced prices, accelerated application deployment, and dynamic …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
US10057282B2 (en) Detecting and reacting to malicious activity in decrypted application data
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
Aguiar et al. An overview of issues and recent developments in cloud computing and storage security
US20210306145A1 (en) Systems and methods of post-quantum security management
Sumitra et al. A survey of cloud authentication attacks and solution approaches
Pericherla Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
Oberoi et al. SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS.
Shajan et al. Survey of security threats and countermeasures in cloud computing
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
Chuka-Maduji et al. Cloud computing security challenges and related defensive measures: a survey and taxonomy
Mishra et al. Design of a cloud-based security mechanism for Industry 4.0 communication
Vemula Recent Advancements in Cloud Security Using Performance Technologies and Techniques
Sangui et al. Cloud security using honeypot network and blockchain: a review
Hayawi et al. A false positive resilient distributed trust management framework for collaborative intrusion detection systems
Sivaraman Behavioral DDoS Prevention through Zero Trust Principles in Edge Computing
Varadharajan et al. Securing services in networked cloud infrastructures
Waqas et al. Sharing of attacks information across clouds for improving security: A conceptual framework
Chaudhari et al. A review on cloud security issues and solutions
Shyam et al. Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey.
Rani et al. Classification of security issues and cyber attacks in layered internet of things
Aich et al. Study on cloud security risk and remedy
Manaa Data encryption scheme for large data scale in cloud computing
Jha et al. Framework to analyze malicious behaviour in cloud environment using machine learning techniques
Banafar et al. Intrusion detection and prevention system for cloud simulation environment using Hidden Markov Model and MD5
Jena et al. A pragmatic analysis of security concerns in Cloud, Fog, and Edge Environment