{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:12Z","timestamp":1750221192638,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,21]],"date-time":"2018-12-21T00:00:00Z","timestamp":1545350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,21]]},"DOI":"10.1145\/3299819.3299821","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"76-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System"],"prefix":"10.1145","author":[{"given":"Azuan","family":"Ahmad","sequence":"first","affiliation":[{"name":"Universiti Sains Islam Malaysia, Malaysia"}]},{"given":"Wan Shafiuddin","family":"Zainudin","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia, Seri Kembangan, Selangor, Malaysia"}]},{"given":"Mohd Nazri","family":"Kama","sequence":"additional","affiliation":[{"name":"Advanced Informatics School, Universiti Teknologi Malaysia"}]},{"given":"Norbik Bashah","family":"Idris","sequence":"additional","affiliation":[{"name":"International Islamic University Malaysia"}]},{"given":"Madihah Mohd","family":"Saudi","sequence":"additional","affiliation":[{"name":"Universiti Sains Islam Malaysia, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2018,12,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_3_2_1_2_1","volume-title":"2017 State of the Cloud Survey,\" Right Scale","author":"Weins K.","year":"2017","unstructured":"K. Weins , \"Cloud Computing Trends : 2017 State of the Cloud Survey,\" Right Scale , 2017 . K. Weins, \"Cloud Computing Trends: 2017 State of the Cloud Survey,\" Right Scale, 2017."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3190642"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00182"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)30092-1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.03.010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.181"},{"key":"e_1_3_2_1_9_1","volume-title":"targeting cloud","author":"Seals T.","year":"2015","unstructured":"T. Seals , \"Q1 2015 ddos attacks spike , targeting cloud .\" 2015 . T. Seals, \"Q1 2015 ddos attacks spike, targeting cloud.\" 2015."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03958"},{"key":"e_1_3_2_1_11_1","first-page":"265","volume-title":"2010 Sixth International Conference on","author":"Mazzariello C.","year":"2010","unstructured":"C. Mazzariello , R. Bifulco , and R. Canonico , \" Integrating a network ids into an open source cloud computing environment,\" in Information Assurance and Security (IAS) , 2010 Sixth International Conference on , 2010 , pp. 265 -- 270 . C. Mazzariello, R. Bifulco, and R. Canonico, \"Integrating a network ids into an open source cloud computing environment,\" in Information Assurance and Security (IAS), 2010 Sixth International Conference on, 2010, pp. 265--270."},{"key":"e_1_3_2_1_12_1","volume-title":"Autonomic intrusion detection system in cloud computing with big data,\" in Proceedings of the International Conference on Security and Management (SAM)","author":"Vieira K. M. M.","year":"2014","unstructured":"K. M. M. Vieira , F. Schubert , G. A. Geronimo , R. de Souza Mendes , and C. B. Westphall , \" Autonomic intrusion detection system in cloud computing with big data,\" in Proceedings of the International Conference on Security and Management (SAM) , 2014 , p. 1. K. M. M. Vieira, F. Schubert, G. A. Geronimo, R. de Souza Mendes, and C. B. Westphall, \"Autonomic intrusion detection system in cloud computing with big data,\" in Proceedings of the International Conference on Security and Management (SAM), 2014, p. 1."},{"key":"e_1_3_2_1_13_1","volume-title":"Cloud denial of service detection by dendritic cell mechanism,\" in 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","author":"Ahmad A.","year":"2018","unstructured":"A. Ahmad , M. N. Kama , O. M. Yusop , N. A. A. Bakar , and N. B. Idris , \" Cloud denial of service detection by dendritic cell mechanism,\" in 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) , 2018 . A. Ahmad, M. N. Kama, O. M. Yusop, N. A. A. Bakar, and N. B. Idris, \"Cloud denial of service detection by dendritic cell mechanism,\" in 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2018."},{"issue":"38","key":"e_1_3_2_1_14_1","first-page":"135","article-title":"Distributed cloud intrusion detection model","volume":"34","author":"Gul I.","year":"2011","unstructured":"I. Gul and M. Hussain , \" Distributed cloud intrusion detection model ,\" Int. J. Adv. Sci. Technol. , vol. 34 , no. 38 , p. 135 , 2011 . I. Gul and M. Hussain, \"Distributed cloud intrusion detection model,\" Int. J. Adv. Sci. Technol., vol. 34, no. 38, p. 135, 2011.","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"e_1_3_2_1_15_1","unstructured":"S. T. Zargar H. Takabi and J. B. D. Joshi \"DCDIDP: A distributed collaborative and data-driven intrusion detection and prevention framework for cloud computing environments \" in Collaborative computing: Networking applications and worksharing (collaboratecom) 2011 7th international conference on 2011 pp. 332--341.  S. T. Zargar H. Takabi and J. B. D. Joshi \"DCDIDP: A distributed collaborative and data-driven intrusion detection and prevention framework for cloud computing environments \" in Collaborative computing: Networking applications and worksharing (collaboratecom) 2011 7th international conference on 2011 pp. 332--341."},{"key":"e_1_3_2_1_16_1","first-page":"466","article-title":"An adaptive distributed intrusion detection system for cloud computing framework","author":"Krishnan D.","year":"2012","unstructured":"D. Krishnan and M. Chatterjee , \" An adaptive distributed intrusion detection system for cloud computing framework ,\" in International Conference on Security in Computer Networks and Distributed Systems , 2012 , pp. 466 -- 473 . D. Krishnan and M. Chatterjee, \"An adaptive distributed intrusion detection system for cloud computing framework,\" in International Conference on Security in Computer Networks and Distributed Systems, 2012, pp. 466--473.","journal-title":"International Conference on Security in Computer Networks and Distributed Systems"},{"key":"e_1_3_2_1_17_1","first-page":"91","article-title":"A collaborative intrusion detection system framework for cloud computing","volume":"2011","author":"Man N. D.","year":"2012","unstructured":"N. D. Man and E.-N. Huh , \" A collaborative intrusion detection system framework for cloud computing ,\" in Proceedings of the International Conference on IT Convergence and Security 2011 , 2012 , pp. 91 -- 109 . N. D. Man and E.-N. Huh, \"A collaborative intrusion detection system framework for cloud computing,\" in Proceedings of the International Conference on IT Convergence and Security 2011, 2012, pp. 91--109.","journal-title":"Proceedings of the International Conference on IT Convergence and Security"},{"key":"e_1_3_2_1_18_1","first-page":"199","article-title":"An alternative model of virtualization based intrusion detection system in cloud computing","volume":"3","author":"Ghosh P.","year":"2014","unstructured":"P. Ghosh , R. Ghosh , and R. Dutta , \" An alternative model of virtualization based intrusion detection system in cloud computing ,\" Int. J. Sci. Technol. Res. , vol. 3 , pp. 199 -- 203 , 2014 . P. Ghosh, R. Ghosh, and R. Dutta, \"An alternative model of virtualization based intrusion detection system in cloud computing,\" Int. J. Sci. Technol. Res., vol. 3, pp. 199--203, 2014.","journal-title":"Int. J. Sci. Technol. Res."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.89"},{"key":"e_1_3_2_1_20_1","unstructured":"G. B. Lamont R. E. Marmelstein and D. A. Van Veldhuizen \"A distributed architecture for a self-adaptive computer virus immune system \" in New ideas in optimization 1999 pp. 167--184.   G. B. Lamont R. E. Marmelstein and D. A. Van Veldhuizen \"A distributed architecture for a self-adaptive computer virus immune system \" in New ideas in optimization 1999 pp. 167--184."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11536444_12"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.iy.09.040191.001415"},{"key":"e_1_3_2_1_23_1","first-page":"43","article-title":"A rough information extraction technique for the dendritic cell algorithm within imprecise circumstances","author":"Chelly Z.","year":"2014","unstructured":"Z. Chelly and Z. Elouedi , \" A rough information extraction technique for the dendritic cell algorithm within imprecise circumstances ,\" in Hellenic Conference on Artificial Intelligence , 2014 , pp. 43 -- 56 . Z. Chelly and Z. Elouedi, \"A rough information extraction technique for the dendritic cell algorithm within imprecise circumstances,\" in Hellenic Conference on Artificial Intelligence, 2014, pp. 43--56.","journal-title":"Hellenic Conference on Artificial Intelligence"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1276966"},{"issue":"3","key":"e_1_3_2_1_25_1","article-title":"Integration of the dendritic cell algorithm with K-means clustering","volume":"6","author":"Mohsin M. F. M.","year":"2014","unstructured":"M. F. M. Mohsin , A. A. Bakar , and A. R. Hamdan , \" Integration of the dendritic cell algorithm with K-means clustering ,\" Int. J. Adv. Soft Compu. Appl , vol. 6 , no. 3 , 2014 . M. F. M. Mohsin, A. A. Bakar, and A. R. Hamdan, \"Integration of the dendritic cell algorithm with K-means clustering,\" Int. J. Adv. Soft Compu. Appl, vol. 6, no. 3, 2014.","journal-title":"Int. J. Adv. Soft Compu. Appl"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-008-0011-y"},{"key":"e_1_3_2_1_27_1","volume-title":"Principle and Application of Dendritic Cell Algorithm for Intrusion Detection,\" in Proceedings of 2011 3rd International Conference on Signal Processing Systems (ICSPS","author":"Zheng X.","year":"2011","unstructured":"X. Zheng and Y. Fang , \" Principle and Application of Dendritic Cell Algorithm for Intrusion Detection,\" in Proceedings of 2011 3rd International Conference on Signal Processing Systems (ICSPS 2011 ), 2011. X. Zheng and Y. Fang, \"Principle and Application of Dendritic Cell Algorithm for Intrusion Detection,\" in Proceedings of 2011 3rd International Conference on Signal Processing Systems (ICSPS 2011), 2011."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.08.005"}],"event":{"name":"AICCC '18: 2018 Artificial Intelligence and Cloud Computing Conference","acronym":"AICCC '18","location":"Tokyo Japan"},"container-title":["Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299819.3299821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3299819.3299821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:15Z","timestamp":1750210755000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299819.3299821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,21]]},"references-count":28,"alternative-id":["10.1145\/3299819.3299821","10.1145\/3299819"],"URL":"https:\/\/doi.org\/10.1145\/3299819.3299821","relation":{},"subject":[],"published":{"date-parts":[[2018,12,21]]},"assertion":[{"value":"2018-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}