{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:30:49Z","timestamp":1759332649001,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,25]],"date-time":"2012-10-25T00:00:00Z","timestamp":1351123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,25]]},"DOI":"10.1145\/2388576.2388585","type":"proceedings-article","created":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T18:34:06Z","timestamp":1351276446000},"page":"67-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["A novel framework for intrusion detection in cloud"],"prefix":"10.1145","author":[{"given":"Chirag","family":"Modi","sequence":"first","affiliation":[{"name":"NIT Surat, INDIA"}]},{"given":"Dhiren","family":"Patel","sequence":"additional","affiliation":[{"name":"NIT Surat, INDIA"}]},{"given":"Bhavesh","family":"Borisanya","sequence":"additional","affiliation":[{"name":"NIT Surat, INDIA"}]},{"given":"Avi","family":"Patel","sequence":"additional","affiliation":[{"name":"City University London, UK"}]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[{"name":"City University London, UK"}]}],"member":"320","published-online":{"date-parts":[[2012,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cloud Computing Comparison Guide howpublished = \"http:\/\/www.webhostingunleashed.com\/whitepaper\/cloud-computing-comparison\/\" .  Cloud Computing Comparison Guide howpublished = \"http:\/\/www.webhostingunleashed.com\/whitepaper\/cloud-computing-comparison\/\" ."},{"key":"e_1_3_2_1_2_1","unstructured":"Cybercrime Battle Basics: Online Account Transaction and Device Protection howpublished = \"www.threatmetrix.com\/docs\/Whitepaper-Cybercrime-Defender.pdf\" year=(2012).  Cybercrime Battle Basics: Online Account Transaction and Device Protection howpublished = \"www.threatmetrix.com\/docs\/Whitepaper-Cybercrime-Defender.pdf\" year=(2012)."},{"key":"e_1_3_2_1_3_1","unstructured":"KDD Cup 1999 howpublished = \"http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html\" .  KDD Cup 1999 howpublished = \"http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html\" ."},{"key":"e_1_3_2_1_4_1","unstructured":"Scapy howpublished = \"http:\/\/www.secdev.org\/projects\/scapy\/\" .  Scapy howpublished = \"http:\/\/www.secdev.org\/projects\/scapy\/\" ."},{"key":"e_1_3_2_1_5_1","unstructured":"Snort-Home page howpublished = \"https:\/\/www.snort.org\/\" .  Snort-Home page howpublished = \"https:\/\/www.snort.org\/\" ."},{"key":"e_1_3_2_1_6_1","unstructured":"The NSL-KDD Data Set howpublished = \"http:\/\/www.iscx.ca\/NSL-KDD\/\" .  The NSL-KDD Data Set howpublished = \"http:\/\/www.iscx.ca\/NSL-KDD\/\" ."},{"key":"e_1_3_2_1_7_1","unstructured":"Wireshark howpublished = \"http:\/\/www.wireshark.org\/\" .  Wireshark howpublished = \"http:\/\/www.wireshark.org\/\" ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.56"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"26","article-title":"Feasibility of intrusion detection system with high performance computing: A survey","volume":"1","author":"Beg S.","year":"2010","unstructured":"S. Beg , U. Naru1, M. Ashraf , and S. Mohsin . Feasibility of intrusion detection system with high performance computing: A survey . International Journal for Advances in Computer Science , 1 ( 1 ): 26 -- 35 , 2010 . S. Beg, U. Naru1, M. Ashraf, and S. Mohsin. Feasibility of intrusion detection system with high performance computing: A survey. International Journal for Advances in Computer Science, 1(1):26--35, 2010.","journal-title":"International Journal for Advances in Computer Science"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402561"},{"key":"e_1_3_2_1_11_1","volume-title":"Amazon EC2 Attack Prompts Customer Support Changes, howpublished = \"http:\/\/searchcloudcomputing.techtarget.com\/news\/article\/0,289142,sid201_gci1371090,00.html\", year =","author":"Brooks C.","year":"2009","unstructured":"C. Brooks . Amazon EC2 Attack Prompts Customer Support Changes, howpublished = \"http:\/\/searchcloudcomputing.techtarget.com\/news\/article\/0,289142,sid201_gci1371090,00.html\", year = 2009 ,. C. Brooks. Amazon EC2 Attack Prompts Customer Support Changes, howpublished = \"http:\/\/searchcloudcomputing.techtarget.com\/news\/article\/0,289142,sid201_gci1371090,00.html\", year = 2009,."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADVCOMP.2009.34"},{"key":"e_1_3_2_1_13_1","volume-title":"IT Cloud Services User Survey, pt.2: Top Benefits & Challenges, howpublished = \"http:\/\/blogs.idc.com\/ie\/?p=210\", year =","author":"Gens F.","year":"2008","unstructured":"F. Gens . IT Cloud Services User Survey, pt.2: Top Benefits & Challenges, howpublished = \"http:\/\/blogs.idc.com\/ie\/?p=210\", year = 2008 ,. F. Gens. IT Cloud Services User Survey, pt.2: Top Benefits & Challenges, howpublished = \"http:\/\/blogs.idc.com\/ie\/?p=210\", year = 2008,."},{"key":"e_1_3_2_1_14_1","volume-title":"Data Mining Concepts and Techniques","author":"Han J.","year":"2006","unstructured":"J. Han and M. Kamber . Data Mining Concepts and Techniques . Morgan Kaufmann Publishers , 2006 . J. Han and M. Kamber. Data Mining Concepts and Techniques. Morgan Kaufmann Publishers, 2006."},{"key":"e_1_3_2_1_15_1","first-page":"251","volume-title":"International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE)","author":"Li H.","year":"2010","unstructured":"H. Li and D. Liu . Research on intelligent intrusion prevention system based on snort . In International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE) , pages 251 -- 253 , 2010 . H. Li and D. Liu. Research on intelligent intrusion prevention system based on snort. In International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE), pages 251--253, 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"Trust and Security to Shape Government Cloud Adoption, howpublished = \"http:\/\/www.lockheedmartin.com\/content\/dam\/lockheed\/data\/corporate\/documents\/Cloud-Computing-White-Paper.pdf\", year =","author":"Martin L.","year":"2010","unstructured":"L. Martin . Awareness , Trust and Security to Shape Government Cloud Adoption, howpublished = \"http:\/\/www.lockheedmartin.com\/content\/dam\/lockheed\/data\/corporate\/documents\/Cloud-Computing-White-Paper.pdf\", year = 2010 ,. L. Martin. Awareness, Trust and Security to Shape Government Cloud Adoption, howpublished = \"http:\/\/www.lockheedmartin.com\/content\/dam\/lockheed\/data\/corporate\/documents\/Cloud-Computing-White-Paper.pdf\", year = 2010,."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604069"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"P. Mell and T. Grance. The nist definition of cloud computing (draft). http:\/\/csrc.nist.gov\/publications\/drafts\/800-145\/Draft-SP-800-145\\_cloud-definition.pdf 2011.   P. Mell and T. Grance. The nist definition of cloud computing (draft). http:\/\/csrc.nist.gov\/publications\/drafts\/800-145\/Draft-SP-800-145\\_cloud-definition.pdf 2011.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"#cr-split#-e_1_3_2_1_19_1.1","doi-asserted-by":"crossref","unstructured":"C. Modi D. Patel B. Borisaniya H. Patel A. Patel and M. Rajarajan. A survey of intrusion detection techniques in cloud. http:\/\/dx.doi.org\/10.1016\/j.jnca.2012.05.003 2012. 10.1016\/j.jnca.2012.05.003","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"#cr-split#-e_1_3_2_1_19_1.2","doi-asserted-by":"crossref","unstructured":"C. Modi D. Patel B. Borisaniya H. Patel A. Patel and M. Rajarajan. A survey of intrusion detection techniques in cloud. http:\/\/dx.doi.org\/10.1016\/j.jnca.2012.05.003 2012.","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"e_1_3_2_1_21_1","first-page":"344","volume-title":"In MIPRO, 2010 Proceedings of the 33rd International Convention","author":"Popovic K.","year":"2010","unstructured":"K. Popovic and Z. Hocenski . Cloud computing security issues and challenges . In In MIPRO, 2010 Proceedings of the 33rd International Convention , pages 344 -- 349 , 2010 . K. Popovic and Z. Hocenski. Cloud computing security issues and challenges. In In MIPRO, 2010 Proceedings of the 33rd International Convention, pages 344--349, 2010."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5120\/5807-8063"},{"key":"e_1_3_2_1_23_1","volume-title":"International Journal of Computer Applications (IJCA), 31(11):1--7","author":"Sathya S. S.","year":"2011","unstructured":"S. S. Sathya , R. G. Ramani , and K. Sivaselvi . Discriminant analysis based feature selection in kdd intrusion dataset . International Journal of Computer Applications (IJCA), 31(11):1--7 , 2011 . S. S. Sathya, R. G. Ramani, and K. Sivaselvi. Discriminant analysis based feature selection in kdd intrusion dataset. International Journal of Computer Applications (IJCA), 31(11):1--7, 2011."},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"In Proc. of the first International Conference on Ad hoc Networks","author":"Sen S.","year":"2009","unstructured":"S. Sen , J. A. Clark , and J. E. Tapiador . Power-aware intrusion detection on mobile ad hoc networks . In In Proc. of the first International Conference on Ad hoc Networks , pages 1 -- 15 , 2009 . S. Sen, J. A. Clark, and J. E. Tapiador. Power-aware intrusion detection on mobile ad hoc networks. In In Proc. of the first International Conference on Ad hoc Networks, pages 1--15, 2009."},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"11th International Conference on Information Fusion","author":"Thomas C.","year":"2008","unstructured":"C. Thomas and N. Balakrishnan . Performance enhancement of intrusion detection systems using advances in sensor fusion . In 11th International Conference on Information Fusion , pages 1 -- 7 , 2008 . C. Thomas and N. Balakrishnan. Performance enhancement of intrusion detection systems using advances in sensor fusion. In 11th International Conference on Information Fusion, pages 1--7, 2008."}],"event":{"name":"SIN '12: 5th International Conference of Security of Information and Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Jaipur India","acronym":"SIN '12"},"container-title":["Proceedings of the Fifth International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2388576.2388585","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2388576.2388585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:13Z","timestamp":1750238473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2388576.2388585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,25]]},"references-count":25,"alternative-id":["10.1145\/2388576.2388585","10.1145\/2388576"],"URL":"https:\/\/doi.org\/10.1145\/2388576.2388585","relation":{},"subject":[],"published":{"date-parts":[[2012,10,25]]},"assertion":[{"value":"2012-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}