Joint Honeypot Networks and Hybrid Intrusion Detection System for Mobile Cloud Computing
References
1,045 citations
654 citations
221 citations
"Joint Honeypot Networks and Hybrid ..." refers background or methods in this paper
...[1] [5] Security frameworks for Mobile Cloud Computing (MCC) is classified into two groups, application security and data security frameworks, storing data on a database in a virtual environment without revealing any details is more difficult for mobile users....
[...]
...[5] [7] By using authentication techniques, potential ransomware will prevent the use of conventional HIDS based on signature matching methods....
[...]
161 citations
"Joint Honeypot Networks and Hybrid ..." refers methods in this paper
...Wang et al suggested a methodology that relates to the central management approach, even though it has the drawbacks of all strategies that use centralized control in a distributed environment [10], Similarly, Modi et al initiated a method for a stepwise detection of intrusion....
[...]
159 citations
"Joint Honeypot Networks and Hybrid ..." refers methods in this paper
...[4] The below Figure 1 shows a design of the MCC process, the core techniques used in the technology industry like parallelization model, virtualization and mass production are the three primary techniques for cloud computing....
[...]