{"id":"https://openalex.org/W4327781362","doi":"https://doi.org/10.1109/sds57574.2022.10062930","title":"A New Approach Based on a Multi\u2013Agent System for IDS in Cloud Computing","display_name":"A New Approach Based on a Multi\u2013Agent System for IDS in Cloud Computing","publication_year":2022,"publication_date":"2022-12-12","ids":{"openalex":"https://openalex.org/W4327781362","doi":"https://doi.org/10.1109/sds57574.2022.10062930"},"language":"en","primary_location":{"id":"doi:10.1109/sds57574.2022.10062930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sds57574.2022.10062930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Ninth International Conference on Software Defined Systems (SDS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038084112","display_name":"Dounya Kassimi","orcid":null},"institutions":[{"id":"https://openalex.org/I50219554","display_name":"University of Laghouat","ror":"https://ror.org/018bbh535","country_code":"DZ","type":"education","lineage":["https://openalex.org/I50219554"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Dounya Kassimi","raw_affiliation_strings":["University Center Aflou,Department of Computer Science,Laghouat,Algeria","Department of Computer Science, University Center Aflou, Laghouat, Algeria"],"affiliations":[{"raw_affiliation_string":"University Center Aflou,Department of Computer Science,Laghouat,Algeria","institution_ids":["https://openalex.org/I50219554"]},{"raw_affiliation_string":"Department of Computer Science, University Center Aflou, Laghouat, Algeria","institution_ids":["https://openalex.org/I50219554"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009358077","display_name":"Okba Kazar","orcid":"https://orcid.org/0000-0003-0522-4954"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Okba Kazar","raw_affiliation_strings":["UAE University,Department of Information Systems and Security,Al Ain,United Arab Emirates","Department of Information Systems and Security, UAE University, Al Ain, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"UAE University,Department of Information Systems and Security,Al Ain,United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Information Systems and Security, UAE University, Al Ain, United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066524623","display_name":"Ezedin Barka","orcid":"https://orcid.org/0000-0002-3995-7198"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ezedin Barka","raw_affiliation_strings":["UAE University,Department of Information Systems and Security,Al Ain,United Arab Emirates","Department of Information Systems and Security, UAE University, Al Ain, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"UAE University,Department of Information Systems and Security,Al Ain,United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Information Systems and Security, UAE University, Al Ain, United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043498884","display_name":"Abdelhak Merizig","orcid":"https://orcid.org/0000-0001-6817-323X"},"institutions":[{"id":"https://openalex.org/I206961696","display_name":"University of Biskra","ror":"https://ror.org/05fr5y859","country_code":"DZ","type":"education","lineage":["https://openalex.org/I206961696"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Abdelhak Merizig","raw_affiliation_strings":["University of Biskra,Department of Computer Science,Biskra,Algeria","Department of Computer Science, University of Biskra, Biskra, Algeria"],"affiliations":[{"raw_affiliation_string":"University of Biskra,Department of Computer Science,Biskra,Algeria","institution_ids":["https://openalex.org/I206961696"]},{"raw_affiliation_string":"Department of Computer Science, University of Biskra, Biskra, Algeria","institution_ids":["https://openalex.org/I206961696"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089428654","display_name":"Zina Houhamdi","orcid":"https://orcid.org/0000-0002-1082-4447"},"institutions":[{"id":"https://openalex.org/I161913731","display_name":"Al Ain University","ror":"https://ror.org/023abrt21","country_code":"AE","type":"education","lineage":["https://openalex.org/I161913731"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Zina Houhamdi","raw_affiliation_strings":["Al Ain University,Cybersecurity Department,Al Ain,United Arab Emirates","Cybersecurity Department, Al Ain University, Al Ain, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Al Ain University,Cybersecurity Department,Al Ain,United Arab Emirates","institution_ids":["https://openalex.org/I161913731"]},{"raw_affiliation_string":"Cybersecurity Department, Al Ain University, Al Ain, United Arab Emirates","institution_ids":["https://openalex.org/I161913731"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014249005","display_name":"Belkacem Athamena","orcid":"https://orcid.org/0000-0002-9376-7790"},"institutions":[{"id":"https://openalex.org/I161913731","display_name":"Al Ain University","ror":"https://ror.org/023abrt21","country_code":"AE","type":"education","lineage":["https://openalex.org/I161913731"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Belkacem Athamena","raw_affiliation_strings":["Al Ain University,Business Administration Department,Al Ain,United Arab Emirates","Business Administration Department, Al Ain University, Al Ain, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Al Ain University,Business Administration Department,Al Ain,United Arab Emirates","institution_ids":["https://openalex.org/I161913731"]},{"raw_affiliation_string":"Business Administration Department, Al Ain University, Al Ain, United Arab Emirates","institution_ids":["https://openalex.org/I161913731"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074156989","display_name":"Meftah Zaoui","orcid":null},"institutions":[{"id":"https://openalex.org/I206961696","display_name":"University of Biskra","ror":"https://ror.org/05fr5y859","country_code":"DZ","type":"education","lineage":["https://openalex.org/I206961696"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Meftah Zaoui","raw_affiliation_strings":["University of Biskra,Department of Computer Science,Biskra,Algeria","Department of Computer Science, University of Biskra, Biskra, Algeria"],"affiliations":[{"raw_affiliation_string":"University of Biskra,Department of Computer Science,Biskra,Algeria","institution_ids":["https://openalex.org/I206961696"]},{"raw_affiliation_string":"Department of Computer Science, University of Biskra, Biskra, Algeria","institution_ids":["https://openalex.org/I206961696"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5038084112"],"corresponding_institution_ids":["https://openalex.org/I50219554"],"apc_list":null,"apc_paid":null,"fwci":0.7119,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73049705,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8849865198135376},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7877030372619629},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6335984468460083},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6163967847824097},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5728378295898438},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5599015951156616},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5425357222557068},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5087617039680481},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4745163321495056},{"id":"https://openalex.org/keywords/utility-computing","display_name":"Utility computing","score":0.4602543115615845},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45575207471847534},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.370319664478302},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.22232496738433838},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.12399280071258545},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1019812822341919},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08640533685684204}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8849865198135376},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7877030372619629},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6335984468460083},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6163967847824097},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5728378295898438},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5599015951156616},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5425357222557068},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5087617039680481},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4745163321495056},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.4602543115615845},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45575207471847534},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.370319664478302},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.22232496738433838},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.12399280071258545},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1019812822341919},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08640533685684204},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sds57574.2022.10062930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sds57574.2022.10062930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Ninth International Conference on Software Defined Systems (SDS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W14406115","https://openalex.org/W75761354","https://openalex.org/W103634144","https://openalex.org/W1418477825","https://openalex.org/W1524993063","https://openalex.org/W1559424115","https://openalex.org/W2000586411","https://openalex.org/W2038889839","https://openalex.org/W2043491664","https://openalex.org/W2087056765","https://openalex.org/W2105186009","https://openalex.org/W2108142795","https://openalex.org/W2111877895","https://openalex.org/W2124808847","https://openalex.org/W2130802299","https://openalex.org/W2139836766","https://openalex.org/W2140190241","https://openalex.org/W2148850383","https://openalex.org/W2149966042","https://openalex.org/W2188735660","https://openalex.org/W2289716850","https://openalex.org/W2299147308","https://openalex.org/W2740985199","https://openalex.org/W2748012568","https://openalex.org/W2765146381","https://openalex.org/W2767715014","https://openalex.org/W2783486645","https://openalex.org/W2809471091","https://openalex.org/W4233416247","https://openalex.org/W6687177199"],"related_works":["https://openalex.org/W1935342657","https://openalex.org/W4281784929","https://openalex.org/W2080464316","https://openalex.org/W2335992547","https://openalex.org/W2885745662","https://openalex.org/W1557621806","https://openalex.org/W2564034111","https://openalex.org/W3142266060","https://openalex.org/W2184485590","https://openalex.org/W78285473"],"abstract_inverted_index":{"Cloud":[0,131,146],"computing":[1,54],"is":[2,11,17,37,81,106],"a":[3,33,66,90,100,161],"recent":[4],"innovation":[5],"in":[6,145,156],"the":[7,30,39,53,94,117,169,175,182],"IT":[8,44],"industry":[9],"that":[10],"expanding":[12],"quickly.":[13],"Furthermore,":[14],"this":[15],"technology":[16],"widely":[18,119],"used":[19],"to":[20,51,93,177],"provide":[21],"computation,":[22],"data":[23,98,150,155],"storage,":[24],"and":[25,63,83,108,126,133,138,148],"other":[26],"resources":[27,132],"remotely":[28],"through":[29,60],"web":[31],"on":[32,168],"pay-per-usage":[34],"basis.":[35],"It":[36],"now":[38],"favored":[40],"option":[41],"for":[42],"any":[43],"firm":[45],"since":[46],"it":[47,87],"increases":[48],"its":[49,57],"capacity":[50],"satisfy":[52],"requirements":[55],"of":[56,122],"everyday":[58],"operations":[59],"scalability,":[61],"mobility,":[62],"flexibility":[64],"at":[65],"low":[67],"price.":[68],"But":[69],"there":[70],"are":[71],"two":[72],"key":[73],"problems":[74],"with":[75],"cloud":[76,95],"computing.":[77],"The":[78,103,110,172],"biggest":[79],"issue":[80],"storage-related,":[82],"Google":[84],"has":[85,115],"addressed":[86],"by":[88],"adding":[89],"new":[91],"layer":[92],"dubbed":[96],"\u201cBig":[97],"as":[99],"service":[101],"(BDaaS).\u201d":[102],"second":[104],"problem":[105],"security":[107],"privacy.":[109],"Intrusion":[111],"Detection":[112],"System":[113],"(IDS)":[114],"become":[116],"most":[118,176],"utilized":[120],"component":[121],"computer":[123],"systems,":[124],"security,":[125],"compliance":[127],"processes,":[128],"safeguarding":[129],"network-accessible":[130],"services":[134],"from":[135],"various":[136],"threats":[137],"assaults.":[139],"This":[140],"study":[141],"examines":[142],"IDS":[143],"approaches":[144],"Computing":[147],"big":[149],"sets.":[151],"To":[152],"identify":[153],"anomalous":[154],"BDaaS,":[157],"we":[158],"also":[159],"suggested":[160],"sensible":[162],"intrusion":[163],"detection":[164],"system":[165],"(SIDS)":[166],"based":[167],"autonomic":[170],"system.":[171],"agent":[173],"contributes":[174],"introducing":[178],"more":[179],"proprieties,":[180],"particularly":[181],"autonomy":[183],"element.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-04T09:10:02.777135","created_date":"2025-10-10T00:00:00"}
