@conference {Youssef2017, title = {Intrusion detection in cloud computing based attacks patterns and risk assessment}, booktitle = {Proceedings - 2016 3rd International Conference on Systems of Collaboration, SysCo 2016}, year = {2017}, note = {cited By 0}, abstract = {This paper focuses on detecting and analyzing cyber-attacks in cloud environment, it represents a novel approach of detecting cyber-attacks by analyzing attacks pattern using risk assessment methodologies. The aims of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS) deployed in cloud services with data of risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability to detect the impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will minimize the false positive alerts and will improve the performance of the IDS. {\textcopyright} 2016 IEEE.}, doi = {10.1109/SYSCO.2016.7831341}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013877237\&doi=10.1109\%2fSYSCO.2016.7831341\&partnerID=40\&md5=7979e48da64722d85786884f412eca50}, author = {Youssef, B.C. and Nada, M. and Elmehdi, B. and Boubker, R.} }