Sangui et al., 2021 - Google Patents
Cloud security using honeypot network and blockchain: a reviewSangui et al., 2021
- Document ID
- 9127344121763664408
- Author
- Sangui S
- Ghosh S
- Publication year
- Publication venue
- Machine learning techniques and analytics for cloud security
External Links
Snippet
Cloud technology has revolutionized the domain of computing in recent years. The cloud has succeeded to attract many businesses to use cloud resources or host most of their data in the cloud with their reduced prices, accelerated application deployment, and dynamic …
- 238000005516 engineering process 0 abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10057282B2 (en) | Detecting and reacting to malicious activity in decrypted application data | |
| Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
| Aguiar et al. | An overview of issues and recent developments in cloud computing and storage security | |
| US20210306145A1 (en) | Systems and methods of post-quantum security management | |
| Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
| Pericherla | Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. | |
| Oberoi et al. | SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS. | |
| Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
| Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
| Chuka-Maduji et al. | Cloud computing security challenges and related defensive measures: a survey and taxonomy | |
| Mishra et al. | Design of a cloud-based security mechanism for Industry 4.0 communication | |
| Vemula | Recent Advancements in Cloud Security Using Performance Technologies and Techniques | |
| Sangui et al. | Cloud security using honeypot network and blockchain: a review | |
| Hayawi et al. | A false positive resilient distributed trust management framework for collaborative intrusion detection systems | |
| Sivaraman | Behavioral DDoS Prevention through Zero Trust Principles in Edge Computing | |
| Varadharajan et al. | Securing services in networked cloud infrastructures | |
| Waqas et al. | Sharing of attacks information across clouds for improving security: A conceptual framework | |
| Chaudhari et al. | A review on cloud security issues and solutions | |
| Shyam et al. | Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey. | |
| Rani et al. | Classification of security issues and cyber attacks in layered internet of things | |
| Aich et al. | Study on cloud security risk and remedy | |
| Manaa | Data encryption scheme for large data scale in cloud computing | |
| Jha et al. | Framework to analyze malicious behaviour in cloud environment using machine learning techniques | |
| Banafar et al. | Intrusion detection and prevention system for cloud simulation environment using Hidden Markov Model and MD5 | |
| Jena et al. | A pragmatic analysis of security concerns in Cloud, Fog, and Edge Environment |