Skip to main content

Advances, Systems and Applications

Table 1 Overview and classification of existing work on security in cloud

From: Deep learning approach to security enforcement in cloud workflow orchestration

 

Anomaly Types

Anomaly Detection Technique

System Data Collection

Real-time Anomaly Detection

Workflow Orchestration

Papers

Data Security

Behavior

Intrusion Detection

ML

Neural Networks

Policy-based

[35, 36]

 

  

 

 

[34]

  

  

[37, 26]

 

  

    

[28]

  

 

    

[29, 25]

  

    

 

[30]

  

    

[31]

    

 

 

Our System