Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning

Pages: 757 - 764
Published: Nov 16, 2011
Abstract
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may make the detection process even harder. We found these insiders' activities form similar pattern in the monitoring systems as some other cyber attacks because these also uses huge computer resources. In this paper we first provide a...
Paper Details
Title
Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning
Published Date
Nov 16, 2011
Journal
Pages
757 - 764
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.