Toumi et al., 2023 - Google Patents
Cooperative Trust Framework Based on Hy-Ids, Firewalls, And Mobile Agents to Enhance Security in A Cloud EnvironmentToumi et al., 2023
View PDF- Document ID
- 4971306902407784260
- Author
- Toumi H
- Fagroud F
- Achtaich K
- Lakrami F
- Talea M
- Publication year
- Publication venue
- Journal of Theoretical and Applied Information Technology
External Links
Snippet
Cloud computing has indeed become a popular method for hosting and delivering internet- based services due to its efficiency and scalability. However, as with any technology, there are inherent security risks associated with it. Organizations must carefully evaluate the …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
| US10462188B2 (en) | Computer network security system | |
| Modi et al. | A survey of intrusion detection techniques in cloud | |
| US9641544B1 (en) | Automated insider threat prevention | |
| EP2599026B1 (en) | System and method for local protection against malicious software | |
| Carlin et al. | Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges | |
| WO2007124206A2 (en) | System and method for securing information in a virtual computing environment | |
| Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
| Ahmed et al. | Modelling cyber security for software-defined networks those grow strong when exposed to threats: Analysis and propositions | |
| Ravji et al. | Integrated intrusion detection and prevention system with honeypot in cloud computing | |
| WO2025029704A1 (en) | System and method for attacker interdiction using track and trace user and entity behavior analysis | |
| Lamaazi | Cyber security for edge/fog computing applications | |
| Candel et al. | Serverless security analysis for IoT applications | |
| Foo et al. | Intrusion response systems: a survey | |
| Man et al. | A collaborative intrusion detection system framework for cloud computing | |
| Ahmad et al. | Security challenges from abuse of cloud service threat | |
| Medaram et al. | Malware mitigation in cloud computing architecture | |
| Toumi et al. | Cooperative Trust Framework Based on Hy-Ids, Firewalls, And Mobile Agents to Enhance Security in A Cloud Environment | |
| US20250240313A1 (en) | Large language model (llm) powered detection reasoning solution | |
| Goyal et al. | Application of deep learning in honeypot network for cloud intrusion detection | |
| US20250039193A1 (en) | Intrusion prevention based on infection chains | |
| Kumar | Intrusion detection and prevention system in enhancing security of cloud environment | |
| Shamsan et al. | Security Issues and Challenges in SDN | |
| Kfouri et al. | Design of a Distributed HIDS for IoT Backbone Components. | |
| Grigorescu et al. | CODA footprint continuous security management platform |