{"id":"https://openalex.org/W2921068509","doi":"https://doi.org/10.1145/3299819.3299821","title":"Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System","display_name":"Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System","publication_year":2018,"publication_date":"2018-12-21","ids":{"openalex":"https://openalex.org/W2921068509","doi":"https://doi.org/10.1145/3299819.3299821","mag":"2921068509"},"language":"en","primary_location":{"id":"doi:10.1145/3299819.3299821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3299819.3299821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028941306","display_name":"Azuan Ahmad","orcid":"https://orcid.org/0000-0003-4532-6381"},"institutions":[{"id":"https://openalex.org/I112982808","display_name":"Universiti Sains Islam Malaysia","ror":"https://ror.org/020ast312","country_code":"MY","type":"education","lineage":["https://openalex.org/I112982808"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Azuan Ahmad","raw_affiliation_strings":["Universiti Sains Islam Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Sains Islam Malaysia, Malaysia","institution_ids":["https://openalex.org/I112982808"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046635628","display_name":"Wan Shafiuddin Zainudin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wan Shafiuddin Zainudin","raw_affiliation_strings":["CyberSecurity Malaysia, Seri Kembangan, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"CyberSecurity Malaysia, Seri Kembangan, Selangor, Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035244302","display_name":"Nazri Kama","orcid":"https://orcid.org/0000-0003-2535-3438"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Nazri Kama","raw_affiliation_strings":["Advanced Informatics School, Universiti Teknologi Malaysia"],"affiliations":[{"raw_affiliation_string":"Advanced Informatics School, Universiti Teknologi Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070232222","display_name":"Norbik Bashah Idris","orcid":"https://orcid.org/0000-0001-7711-6819"},"institutions":[{"id":"https://openalex.org/I4164984","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139","country_code":"MY","type":"education","lineage":["https://openalex.org/I4164984"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Norbik Bashah Idris","raw_affiliation_strings":["International Islamic University Malaysia"],"affiliations":[{"raw_affiliation_string":"International Islamic University Malaysia","institution_ids":["https://openalex.org/I4164984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020225491","display_name":"Madihah Mohd Saudi","orcid":"https://orcid.org/0000-0001-9120-1702"},"institutions":[{"id":"https://openalex.org/I112982808","display_name":"Universiti Sains Islam Malaysia","ror":"https://ror.org/020ast312","country_code":"MY","type":"education","lineage":["https://openalex.org/I112982808"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Madihah Mohd Saudi","raw_affiliation_strings":["Universiti Sains Islam Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Sains Islam Malaysia, Malaysia","institution_ids":["https://openalex.org/I112982808"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5028941306"],"corresponding_institution_ids":["https://openalex.org/I112982808"],"apc_list":null,"apc_paid":null,"fwci":0.2227,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.55271616,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"76","last_page":"82"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8687965869903564},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8199295401573181},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7942056059837341},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7921841144561768},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.7092874050140381},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5448356866836548},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5394412279129028},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2511970102787018},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17798671126365662},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1550147533416748},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10250559449195862}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8687965869903564},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8199295401573181},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7942056059837341},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7921841144561768},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.7092874050140381},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5448356866836548},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5394412279129028},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2511970102787018},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17798671126365662},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1550147533416748},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10250559449195862}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3299819.3299821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3299819.3299821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:generic.eprints.org:69608","is_oa":false,"landing_page_url":"http://eprints.undip.ac.id/69608/1/15_Bioma_2012_Chromosomes.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400734","display_name":"UNDIP Institutional Repository (UNDIP-IR) (Diponegoro University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11855966","host_organization_name":"Diponegoro University","host_organization_lineage":["https://openalex.org/I11855966"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W157259957","https://openalex.org/W162924836","https://openalex.org/W777151904","https://openalex.org/W1864403886","https://openalex.org/W1976188373","https://openalex.org/W1984922480","https://openalex.org/W2005182641","https://openalex.org/W2033929907","https://openalex.org/W2036037532","https://openalex.org/W2114296561","https://openalex.org/W2118599924","https://openalex.org/W2119028650","https://openalex.org/W2121126936","https://openalex.org/W2128773324","https://openalex.org/W2153495198","https://openalex.org/W2154350082","https://openalex.org/W2177327503","https://openalex.org/W2182606000","https://openalex.org/W2186252742","https://openalex.org/W2197538184","https://openalex.org/W2322860310","https://openalex.org/W2344386858","https://openalex.org/W2798112595","https://openalex.org/W2816623457","https://openalex.org/W3148592281","https://openalex.org/W4285719527","https://openalex.org/W6704394193","https://openalex.org/W6982529695"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2157496457"],"abstract_inverted_index":{"Cloud":[0,80,111,140],"computing":[1,60,78,112],"introduces":[2],"concerns":[3],"about":[4],"data":[5],"protection":[6],"and":[7,89,148,172,190],"intrusion":[8,107,134],"detection":[9,53,108,128,135,150,168],"mechanism.":[10,151],"A":[11],"review":[12],"of":[13,23,50,91,98,197,204,225,228],"the":[14,126,131,165,180,202,205,217,226,233,236,238],"literature":[15],"shows":[16],"that":[17,28,145,216,230],"there":[18,46],"is":[19,47,120],"still":[20,65],"a":[21,41,84,105,117,156,187],"lack":[22,49,90],"works":[24,138],"on":[25,30,94,139],"cloud":[26,59,77],"IDS":[27,72],"focused":[29],"implementing":[31],"real-time":[32],"hybrid":[33,106,133],"detections":[34],"using":[35,66,192],"Dendritic":[36],"Cell":[37],"algorithm":[38,129],"(DCA)":[39],"as":[40,125],"practical":[42],"approach.":[43],"In":[44,162],"addition,":[45],"also":[48,82,154],"specific":[51],"threat":[52],"built":[54],"to":[55,73,103,222,244,249],"detect":[56,74,223],"intrusions":[57],"targeting":[58,76],"environment":[61,189],"where":[62],"current":[63],"implementations":[64,81],"traditional":[67],"open":[68],"source":[69],"or":[70],"enterprise":[71],"threats":[75],"environment.":[79,113],"introduce":[83],"new":[85,132],"term,":[86],"\"co-residency\"":[87],"attack":[88,167],"research":[92,101,124,153],"focusing":[93],"detecting":[95,159,209],"this":[96,115,123,163],"type":[97],"attack.":[99],"This":[100,152],"aims":[102],"provide":[104],"model":[109,169,207,219,240],"for":[110,200],"For":[114],"purpose,":[116],"modified":[118],"DCA":[119,246],"proposed":[121,155,171,206,218],"in":[122,130,158,186,208],"main":[127],"mechanism":[136],"which":[137],"Co-Residency":[141],"Threat":[142],"Detection":[143],"(CCTD)":[144],"combines":[146],"anomaly":[147],"misuse":[149],"method":[157],"co-residency":[160,166,195,211],"attacks.":[161,212],"paper":[164],"was":[170,184,220],"tested":[173],"until":[174],"satisfactory":[175],"results":[176,214],"were":[177],"obtained":[178],"with":[179],"datasets.":[181],"The":[182,213],"experiment":[183],"conducted":[185,191,231],"controlled":[188],"custom":[193],"generated":[194],"denial":[196],"service":[198],"attacks":[199,229],"testing":[201],"capability":[203],"novel":[210],"show":[215],"able":[221],"most":[224],"types":[227],"during":[232],"experiment.":[234],"From":[235],"experiment,":[237],"CCTD":[239],"has":[241],"been":[242],"shown":[243],"improve":[245],"previously":[247],"used":[248],"solve":[250],"similar":[251],"problem.":[252]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
