[go: up one dir, main page]

Toumi et al., 2023 - Google Patents

Cooperative Trust Framework Based on Hy-Ids, Firewalls, And Mobile Agents to Enhance Security in A Cloud Environment

Toumi et al., 2023

View PDF
Document ID
4971306902407784260
Author
Toumi H
Fagroud F
Achtaich K
Lakrami F
Talea M
Publication year
Publication venue
Journal of Theoretical and Applied Information Technology

External Links

Snippet

Cloud computing has indeed become a popular method for hosting and delivering internet- based services due to its efficiency and scalability. However, as with any technology, there are inherent security risks associated with it. Organizations must carefully evaluate the …
Continue reading at www.jatit.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
US10462188B2 (en) Computer network security system
Modi et al. A survey of intrusion detection techniques in cloud
US9641544B1 (en) Automated insider threat prevention
EP2599026B1 (en) System and method for local protection against malicious software
Carlin et al. Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges
WO2007124206A2 (en) System and method for securing information in a virtual computing environment
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Ahmed et al. Modelling cyber security for software-defined networks those grow strong when exposed to threats: Analysis and propositions
Ravji et al. Integrated intrusion detection and prevention system with honeypot in cloud computing
WO2025029704A1 (en) System and method for attacker interdiction using track and trace user and entity behavior analysis
Lamaazi Cyber security for edge/fog computing applications
Candel et al. Serverless security analysis for IoT applications
Foo et al. Intrusion response systems: a survey
Man et al. A collaborative intrusion detection system framework for cloud computing
Ahmad et al. Security challenges from abuse of cloud service threat
Medaram et al. Malware mitigation in cloud computing architecture
Toumi et al. Cooperative Trust Framework Based on Hy-Ids, Firewalls, And Mobile Agents to Enhance Security in A Cloud Environment
US20250240313A1 (en) Large language model (llm) powered detection reasoning solution
Goyal et al. Application of deep learning in honeypot network for cloud intrusion detection
US20250039193A1 (en) Intrusion prevention based on infection chains
Kumar Intrusion detection and prevention system in enhancing security of cloud environment
Shamsan et al. Security Issues and Challenges in SDN
Kfouri et al. Design of a Distributed HIDS for IoT Backbone Components.
Grigorescu et al. CODA footprint continuous security management platform