{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:37:48Z","timestamp":1732034268206},"reference-count":91,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1016\/j.jnca.2012.08.007","type":"journal-article","created":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T05:34:02Z","timestamp":1346477642000},"page":"25-41","source":"Crossref","is-referenced-by-count":292,"title":["An intrusion detection and prevention system in cloud computing: A systematic review"],"prefix":"10.1016","volume":"36","author":[{"given":"Ahmed","family":"Patel","sequence":"first","affiliation":[]},{"given":"Mona","family":"Taghavi","sequence":"additional","affiliation":[]},{"given":"Kaveh","family":"Bakhtiyari","sequence":"additional","affiliation":[]},{"given":"Joaquim","family":"Celestino J\u00fanior","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2012.08.007_bib59","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s11416-008-0104-2","article-title":"New data mining technique to enhance IDS alarms quality","volume":"6","author":"Al-Mamory","year":"2010","journal-title":"Journal in Computer Virology"},{"key":"10.1016\/j.jnca.2012.08.007_bib63","doi-asserted-by":"crossref","first-page":"101","DOI":"10.22452\/mjcs.vol21no2.3","article-title":"Identifying false alarm for network intrusion detection system using data mining and decision tree","volume":"21","author":"Anuar","year":"2008","journal-title":"Malaysian Journal of Computer Science"},{"key":"10.1016\/j.jnca.2012.08.007_bib68","article-title":"A novel intrusion severity analysis approach for Clouds","author":"Arshad","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.jnca.2012.08.007_bib34","doi-asserted-by":"crossref","DOI":"10.28945\/1086","article-title":"A multi-layered approach to the design of intelligent intrusion detection and prevention system (IIDPS)","volume":"6","author":"Awodele","year":"2009","journal-title":"Issues in Informing Science and Information Technology"},{"key":"10.1016\/j.jnca.2012.08.007_bib47","series-title":"Intrusion Detection Systems: A Taxonomy and Survey. Technical Report No 99\u201315,\u201d Department of Computer Engineering","author":"Axelsson","year":"2000"},{"key":"10.1016\/j.jnca.2012.08.007_bib82","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/2007183.2007189","article-title":"Virtual machine monitor-based lightweight intrusion detection","volume":"45","author":"Azmandian","year":"2011","journal-title":"SIGOPS\u2014Operating Systems Review"},{"key":"10.1016\/j.jnca.2012.08.007_bib89","doi-asserted-by":"crossref","unstructured":"Beale J, AR Baker,B Caswell, and M Poor, \u201cSnort 2.1 Intrusion Detection,\u201d ed.: Syngress Media Inc, 2004, p. 25","DOI":"10.1016\/B978-193183604-3\/50006-0"},{"key":"10.1016\/j.jnca.2012.08.007_bib54","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-642-00670-8_9","article-title":"Next-generation misuse and anomaly prevention system","volume":"19","author":"Bringas","year":"2009","journal-title":"Enterprise Information Systems"},{"key":"10.1016\/j.jnca.2012.08.007_bib13","first-page":"117","volume":"19","author":"Bringas","year":"2009"},{"key":"10.1016\/j.jnca.2012.08.007_bib39","first-page":"584","volume":"5103","author":"Byrski","year":"2008"},{"key":"10.1016\/j.jnca.2012.08.007_bib7","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2006.5","article-title":"Denial-of-service attack-detection techniques","volume":"10","author":"Carl","year":"2006","journal-title":"Internet Computing, IEEE,"},{"key":"10.1016\/j.jnca.2012.08.007_bib88","series-title":"Type-2 Fuzzy Logic in Intelligent Control Applications, in Type-2 Fuzzy Logic","author":"Castillo","year":"2012"},{"key":"10.1016\/j.jnca.2012.08.007_bib45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: a survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.jnca.2012.08.007_bib42","doi-asserted-by":"crossref","first-page":"14","DOI":"10.4304\/jcp.1.1.14-21","article-title":"Mobile agent based wireless sensor networks","volume":"1","author":"Chen","year":"2006","journal-title":"Journal of Computers"},{"key":"10.1016\/j.jnca.2012.08.007_bib1","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.cose.2011.08.004","article-title":"The cyber threat landscape: challenges and future research directions","volume":"30","author":"Choo","year":"2011","journal-title":"Computers & Security"},{"key":"10.1016\/j.jnca.2012.08.007_bib30","article-title":"Host-based intrusion detection systems adapted from agent-based artificial immune systems","author":"Chung-Ming","year":"2012","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jnca.2012.08.007_bib5","unstructured":"Cloud-Security-Alliance. (2010). Top Threats to Cloud Computing V1.0. Available: \u3008https:\/\/cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf\u3009"},{"key":"10.1016\/j.jnca.2012.08.007_bib70","doi-asserted-by":"crossref","unstructured":"Dastjerdi AV, KA Bakar, and SGH Tabatabaei, \u201cDistributed intrusion detection in clouds using mobile agents,\u201d in Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema. pp. 175\u2013180, 2009.","DOI":"10.1109\/ADVCOMP.2009.34"},{"key":"10.1016\/j.jnca.2012.08.007_bib78","doi-asserted-by":"crossref","unstructured":"Dhage S, B Meshram, R Rawat, S Padawe, M Paingaokar, and A Misra, \u201cIntrusion detection system in cloud computing environment,\u201d in International Conference & Workshop on Emerging Trends in Technology, New York, NY, USA pp. 235\u20139, 2011.","DOI":"10.1145\/1980022.1980076"},{"key":"10.1016\/j.jnca.2012.08.007_bib15","doi-asserted-by":"crossref","first-page":"4349","DOI":"10.1016\/j.asoc.2010.12.004","article-title":"Alert correlation in collaborative intelligent intrusion detection systems\u2014a survey","volume":"11","author":"Elshoush","year":"2011","journal-title":"Applied Soft Computing"},{"key":"10.1016\/j.jnca.2012.08.007_bib19","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1016\/j.comcom.2004.07.002","article-title":"Anomaly detection methods in wired networks: a survey and taxonomy","volume":"27","author":"Estevez-Tapiador","year":"2004","journal-title":"Computer Communications"},{"key":"10.1016\/j.jnca.2012.08.007_bib73","doi-asserted-by":"crossref","unstructured":"Foster I, Y Zhao, I Raicu, and S Lu, \u201cCloud computing and grid computing 360-degree compared,\u201d in Grid Computing Environments Workshop, 2008. GCE \u201808 Austin, TX. pp. 1\u201310, 2008","DOI":"10.1109\/GCE.2008.4738445"},{"key":"10.1016\/j.jnca.2012.08.007_bib24","unstructured":"Gaffney JEJr and JW Ulvila, \u201cEvaluation of intrusion detectors: a decision theory approach,\u201d in IEEE Symposium on Security and Privacy, 2001. S&P 2001, Oakland, CA, USA. pp. 50\u201361, 2001."},{"key":"10.1016\/j.jnca.2012.08.007_bib6","unstructured":"Galante J., O Kharif, and P Alpeyev (2011, May 17, 2011). Sony Network Breach Shows Amazon Cloud's Appeal for Hackers. Available: \u3008http:\/\/www.bloomberg.com\/news\/2011-05-15\/sony-attack-shows-amazon-s-cloud-service-lures-hackers-at-pennies-an-hour.html\u3009"},{"key":"10.1016\/j.jnca.2012.08.007_bib26","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","article-title":"Anomaly-based network intrusion detection: techniques, systems and challenges","volume":"28","author":"Garc\u00eda-Teodoro","year":"2009","journal-title":"Computers & Security"},{"key":"10.1016\/j.jnca.2012.08.007_bib69","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2010.115","article-title":"Understanding cloud computing vulnerabilities","volume":"9","author":"Grobauer","year":"2011","journal-title":"Security & Privacy, IEEE"},{"key":"10.1016\/j.jnca.2012.08.007_bib86","unstructured":"Gunasekaran S., \u201cComparison of network intrusion detection systems in cloud computing environment,\u201d in international conference on computer communication and informatics (ICCCI), Coimbatore, pp. 1\u20136, 2012."},{"key":"10.1016\/j.jnca.2012.08.007_bib76","first-page":"19","article-title":"Anomaly-based intrusion detection in software as a service","author":"Gustavo","year":"2011","journal-title":"Dependable Systems and Networks Workshops"},{"key":"10.1016\/j.jnca.2012.08.007_bib38","first-page":"377","volume":"4 204","author":"Herrero","year":"2009"},{"key":"10.1016\/j.jnca.2012.08.007_bib14","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1016\/j.jnca.2009.05.004","article-title":"A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference","volume":"32","author":"Hoang","year":"2009","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.jnca.2012.08.007_bib44","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TDSC.2007.9","article-title":"Hybrid intrusion detection with weighted signature generation over anomalous internet episodes","volume":"4","author":"Hwang","year":"2007","journal-title":"Dependable and Secure Computing, IEEE Transactions on"},{"key":"10.1016\/j.jnca.2012.08.007_bib31","first-page":"651","article-title":"Database intrusion prevention cum detection system with appropriate response","volume":"2","author":"Jaiswal","year":"2010","journal-title":"International Journal of Information Technology"},{"key":"10.1016\/j.jnca.2012.08.007_bib85","first-page":"1","article-title":"A VMM-based intrusion prevention system in cloud computing environment","author":"Jin","year":"2011","journal-title":"The Journal of Supercomputing"},{"key":"10.1016\/j.jnca.2012.08.007_bib46","article-title":"Intrusion Detection Systems","author":"Kazienko","year":"2004","journal-title":"Windowsecurity"},{"key":"10.1016\/j.jnca.2012.08.007_bib48","doi-asserted-by":"crossref","first-page":"23","DOI":"10.3233\/JCS-2002-101-203","article-title":"Using internal sensors and embedded detectors for intrusion detection","volume":"10","author":"Kerschbaum","year":"2002","journal-title":"Journal of Computer Security"},{"key":"10.1016\/j.jnca.2012.08.007_bib17","unstructured":"Kl\u00fcft S, Alarm management for intrusion detection systems\u2014prioritizing and presenting alarms from intrusion detection systems,\u201d Master, Computer Science Programme, master of science thesis, University of Gothenburg, \u3008http:\/\/hdl.handle.net\/2077\/28856\u3009, 2012."},{"key":"10.1016\/j.jnca.2012.08.007_bib29","article-title":"Mobile agent based hierarchical intrusion detection system in wireless sensor networks","volume":"9","author":"Khanum","year":"2012","journal-title":"International Journal of Computer Science Issues, IJCSI"},{"key":"10.1016\/j.jnca.2012.08.007_bib79","doi-asserted-by":"crossref","unstructured":"Kholidy HA and F. Baiardi, CIDS: a Framework for Intrusion Detection in Cloud Systems,\u201d in Ninth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, pp. 379\u20135, 2012.","DOI":"10.1109\/ITNG.2012.94"},{"key":"10.1016\/j.jnca.2012.08.007_bib65","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.future.2012.01.006","article-title":"A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing","volume":"28","author":"Khorshed","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.jnca.2012.08.007_bib49","series-title":"A Guide to Computer Network Security","first-page":"273","article-title":"System intrusion detection and prevention","author":"Kizza","year":"2009"},{"key":"10.1016\/j.jnca.2012.08.007_bib83","unstructured":"Lee JH, MW Park, JH Eom, and TM Chung, \u201cMulti-level Intrusion Detection System and log management in Cloud Computing,\u201d in 13th international conference on advanced communication technology (ICACT), Seoul, pp. 552\u20135, 2011."},{"key":"10.1016\/j.jnca.2012.08.007_bib91","unstructured":"Lee JH, MW Park, JH Eom, and TM Chung, \u201cMulti-level intrusion detection system and log management in cloud computing,\u201d 13th international conference on advanced communication technology (ICACT), pp. 552\u20135, 2011."},{"key":"10.1016\/j.jnca.2012.08.007_bib20","doi-asserted-by":"crossref","unstructured":"Leitner M, Leitner P, Zach M, Collins S, Fahy C, \u201cFault management based on peer-to-peer paradigms; a case study report from the celtic project madeira,\u201d in 10th IFIP\/IEEE International Symposium on Integrated Network Management, pp. 697\u2013700, 2007.","DOI":"10.1109\/INM.2007.374830"},{"key":"10.1016\/j.jnca.2012.08.007_bib41","first-page":"641","article-title":"An immunity-based dynamic multilayer intrusion detection system","volume":"4115","author":"Liang","year":"2006"},{"key":"10.1016\/j.jnca.2012.08.007_bib18","first-page":"307","article-title":"The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection","volume":"2516","author":"Lippmann","year":"2002"},{"key":"10.1016\/j.jnca.2012.08.007_bib33","first-page":"233","volume":"6328","author":"Li","year":"2010"},{"key":"10.1016\/j.jnca.2012.08.007_bib60","doi-asserted-by":"crossref","first-page":"7138","DOI":"10.1016\/j.eswa.2010.03.068","article-title":"An ontology-based intrusion alerts correlation system","volume":"37","author":"Li","year":"2010","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.jnca.2012.08.007_bib51","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.inffus.2009.01.004","article-title":"Reducing false positives in anomaly detectors through fuzzy alert aggregation","volume":"10","author":"Maggi","year":"2009","journal-title":"Information Fusion"},{"key":"10.1016\/j.jnca.2012.08.007_bib57","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10586-009-0096-9","article-title":"Filtering intrusion detection alarms","volume":"13","author":"Mansour","year":"2010","journal-title":"Cluster Computing"},{"key":"10.1016\/j.jnca.2012.08.007_bib81","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez CA , Echeverri GI, and Sanz AGC, \u201cMalware detection based on cloud computing integrating intrusion ontology representation,\u201d in IEEE Latin-American Conference on Communications (LATINCOM), Bogota, pp. 1\u20136, 2010.","DOI":"10.1109\/LATINCOM.2010.5641013"},{"key":"10.1016\/j.jnca.2012.08.007_bib87","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2019618.2019622","article-title":"Cloud-based malware detection for evolving data streams","volume":"2","author":"Masud","year":"2008","journal-title":"ACM Transactions Management Information Systems"},{"key":"10.1016\/j.jnca.2012.08.007_bib25","first-page":"17","article-title":"The \u201cBig Picture\u201d of insider it sabotage across U.S. critical infrastructures","volume":"39","author":"Moore","year":"2008"},{"key":"10.1016\/j.jnca.2012.08.007_bib27","first-page":"611","article-title":"Current intrusion detection techniques in information technology\u2014a detailed analysis","volume":"65","author":"Nazer","year":"2011","journal-title":"European Journal of Scientific Research"},{"key":"10.1016\/j.jnca.2012.08.007_bib22","doi-asserted-by":"crossref","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","article-title":"An overview of anomaly detection techniques: existing solutions and latest technological trends","volume":"51","author":"Patcha","year":"2007","journal-title":"Computer Networks"},{"key":"10.1016\/j.jnca.2012.08.007_bib53","unstructured":"Patel A, Qassim Q, Shukor Z, Nogueira J, J\u00fanior J, Wills C, \u201cAutonomic agent-based self-managed intrusion detection and prevention system,\u201d in South African information security multi-conference (SAISMC 2010), Port Elizabeth, South Africa, pp. 223\u201324, 2009."},{"key":"10.1016\/j.jnca.2012.08.007_bib11","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/09685221011079199","article-title":"A survey of intrusion detection and prevention systems","volume":"18","author":"Patel","year":"2010","journal-title":"Information Management and Computer Security"},{"key":"10.1016\/j.jnca.2012.08.007_bib23","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.engappai.2006.01.003","article-title":"Alarm clustering for intrusion detection systems in computer networks","volume":"19","author":"Perdisci","year":"2006","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"10.1016\/j.jnca.2012.08.007_bib16","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.istr.2005.07.001","article-title":"Data mining and machine learning\u2014towards reducing false positives in intrusion detection","volume":"10","author":"Pietraszek","year":"2005","journal-title":"Information Security Technical Report"},{"key":"10.1016\/j.jnca.2012.08.007_bib36","first-page":"577","article-title":"Incremental hybrid intrusion detection using ensemble of weak classifiers","volume":"6","author":"Rasoulifard","year":"2009"},{"key":"10.1016\/j.jnca.2012.08.007_bib64","doi-asserted-by":"crossref","unstructured":"Roschke S, F Cheng, and C Meinel, \u201cIntrusion detection in the Cloud,\u201d presented at the Eighth IEEE international conference on dependable, autonomic and secure computing, pp. 729\u201334, 2009.","DOI":"10.1109\/DASC.2009.94"},{"key":"10.1016\/j.jnca.2012.08.007_bib10","article-title":"Guide to Intrusion Detection and Prevention Systems (idps)","volume":"800","author":"Scarfone","year":"2007"},{"key":"10.1016\/j.jnca.2012.08.007_bib67","article-title":"The future for cloud computing: opportunities for european cloud computing beyond","author":"Schubert","year":"2010","journal-title":"Expert Group Report, Public Version1, European Commission 2010"},{"key":"10.1016\/j.jnca.2012.08.007_bib2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MSP.2010.2","article-title":"Google android: a comprehensive security assessment","volume":"8","author":"Shabtai","year":"2010","journal-title":"Secur. Privacy IEEE"},{"key":"10.1016\/j.jnca.2012.08.007_bib52","first-page":"28","article-title":"Intrusion detection systems technology","volume":"1","author":"Sharma","year":"2011","journal-title":"International Journal of Engineering and Advanced Technology (IJEAT)"},{"key":"10.1016\/j.jnca.2012.08.007_bib43","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.1016\/j.neucom.2006.01.023","article-title":"Applying genetic algorithm for classifying anomalous TCP\/IP packets","volume":"69","author":"Shon","year":"2006","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jnca.2012.08.007_bib35","series-title":"Data Mining and Multi-agent Integration","first-page":"127","article-title":"A multiagent-based intrusion detection system with the support of multi-class supervised classification","author":"Shyu","year":"2009"},{"key":"10.1016\/j.jnca.2012.08.007_bib8","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MPRV.2004.1316817","article-title":"A smart sensor to detect the falls of the elderly","volume":"3","author":"Smith","year":"2004","journal-title":"Pervasive Computing, IEEE"},{"key":"10.1016\/j.jnca.2012.08.007_bib80","doi-asserted-by":"crossref","unstructured":"Smith D, Q Guan, and S Fu, \u201cAn Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems,\u201d 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), Seoul, pp. 376\u20131, 2010.","DOI":"10.1109\/COMPSACW.2010.72"},{"key":"10.1016\/j.jnca.2012.08.007_bib58","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.cose.2009.07.008","article-title":"Reducing false positives in intrusion detection systems","volume":"29","author":"Spathoulas","year":"2010","journal-title":"Computers & Security"},{"key":"10.1016\/j.jnca.2012.08.007_bib40","first-page":"54","article-title":"Distributed instrusion prevention in active and extensible networks active networks","volume":"3912","author":"Sproull","year":"2007"},{"key":"10.1016\/j.jnca.2012.08.007_bib74","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"Subashini","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.jnca.2012.08.007_bib37","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.cose.2008.12.001","article-title":"A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach","volume":"28","author":"Su","year":"2009","journal-title":"Computers & Security"},{"key":"10.1016\/j.jnca.2012.08.007_bib3","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.inffus.2009.01.001","article-title":"Integrating intrusion alert information to aid forensic explanation: an analytical intrusion detection framework for distributive IDS","volume":"10","author":"Sy","year":"2009","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.jnca.2012.08.007_bib84","doi-asserted-by":"crossref","unstructured":"Takahashi T, Y Kadobayashi, and H Fujiwara, \u201cOntological approach toward cybersecurity in cloud computing,\u201d presented at the Proceedings of the 3rd international conference on Security of information and networks, Taganrog, Rostov-on-Don, Russian Federation, 2010.","DOI":"10.1145\/1854099.1854121"},{"key":"10.1016\/j.jnca.2012.08.007_bib12","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1109\/TNET.2010.2070845","article-title":"Parametric methods for anomaly detection in aggregate traffic,","volume":"19","author":"Thatte","year":"2011","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"10.1016\/j.jnca.2012.08.007_bib56","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1016\/j.cose.2010.02.001","article-title":"A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm","volume":"29","author":"Tjhai","year":"2010","journal-title":"Computers & Security"},{"key":"10.1016\/j.jnca.2012.08.007_bib90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10458-007-9018-5","article-title":"Secure mobile agent execution in virtual environment","volume":"16","author":"Topaloglu","year":"2008","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"10.1016\/j.jnca.2012.08.007_bib75","doi-asserted-by":"crossref","unstructured":"Tupakula U, V Varadharajan, and N Akku, \u201cIntrusion Detection Techniques for Infrastructure as a Service Cloud,\u201d IEEE International Conference on Dependable, Autonomic and Secure Computing pp. 744\u20131, 2011.","DOI":"10.1109\/DASC.2011.128"},{"key":"10.1016\/j.jnca.2012.08.007_bib71","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MC.2009.252","article-title":"Cloud computing and the common man","volume":"42","author":"Viega","year":"2009","journal-title":"Computer"},{"key":"10.1016\/j.jnca.2012.08.007_bib32","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MITP.2009.89","article-title":"Ntrusion detection for grid and cloud computing","volume":"12","author":"Vieira","year":"2010","journal-title":"IT Professional"},{"key":"10.1016\/j.jnca.2012.08.007_bib62","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1016\/j.jnca.2009.02.010","article-title":"Decentralized multi-dimensional alert correlation for collaborative intrusion detection","volume":"32","author":"Vincent Zhou","year":"2009","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.jnca.2012.08.007_bib72","unstructured":"Wang C, Q Wang, K Ren, and W Lou, \u201cEnsuring data storage security in cloud computing,\u201d in 17th International Workshop on Quality of Service, 2009. IWQoS, Charleston, SC. pp. 1\u20139, 2009"},{"key":"10.1016\/j.jnca.2012.08.007_bib9","first-page":"315","author":"Whitman","year":"2011","journal-title":"Principles of Information Security, ed.: Course Technology Ptr"},{"key":"10.1016\/j.jnca.2012.08.007_bib4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","article-title":"The use of computational intelligence in intrusion detection systems: a review","volume":"10","author":"Wu","year":"2010","journal-title":"Applied Soft Computing"},{"key":"10.1016\/j.jnca.2012.08.007_bib28","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","article-title":"Anomaly detection in wireless sensor networks: a survey","volume":"34","author":"Xie","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.jnca.2012.08.007_bib77","unstructured":"Xin W, H Ting-lei, and L Xiao-yu, Research on the Intrusion detection mechanism based on cloud computing,\u201d in 2010 International Conference on Intelligent Computing and Integrated Systems (ICISS), Guilin, pp. 125\u20138, 2010."},{"key":"10.1016\/j.jnca.2012.08.007_bib55","article-title":"Correlation analysis of intrusion alerts","volume":"38","author":"Xu","year":"2008"},{"key":"10.1016\/j.jnca.2012.08.007_bib50","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.dss.2010.06.001","article-title":"A cost-based analysis of intrusion detection system configuration under active or passive response","volume":"50","author":"Yue","year":"2010","journal-title":"Decision Support System"},{"key":"10.1016\/j.jnca.2012.08.007_bib66","unstructured":"Zargar ST, H Takabi, and JBD Joshi, \u201cDcdidp: a distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments,\u201d in International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, Florida, 2011."},{"key":"10.1016\/j.jnca.2012.08.007_bib61","first-page":"500","article-title":"A new intrusion detection method based on antibody concentration emerging intelligent computing technology and applications","volume":"5755","author":"Zeng","year":"2009"},{"key":"10.1016\/j.jnca.2012.08.007_bib21","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","article-title":"A survey of coordinated attacks and collaborative intrusion detection","volume":"29","author":"Zhou","year":"2010","journal-title":"Computers & Security"}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S108480451200183X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S108480451200183X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T08:21:56Z","timestamp":1562142116000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S108480451200183X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":91,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["S108480451200183X"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2012.08.007","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2013,1]]}}}