A Cloud Based Network Intrusion Detection System

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Cloud Computing for Network Security Intrusion Detection System

In recent years, as a new distributed computing model, cloud computing has developed rapidly and become the focus of academia and industry. But now the security issue of cloud computing is a main critical problem of most enterprise customers faced. In the current network environment, that relying on a single terminal to check the Trojan virus is considered increasingly unreliable. This paper an...

متن کامل

A Survey on Cloud Based Intrusion Detection System

Cloud Computing is becoming popular day by day as many enterprise applications and data are moving into cloud based platforms. Because of the distributed nature, cloud computing environments are aim for intruders looking for possible vulnerabilities to exploit. However, with the increasing use of cloud computing, security issues are came out on a growing scale. It is needful to solve these secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tehnicki Vjesnik-technical Gazette

سال: 2022

ISSN: ['1330-3651', '1848-6339']

DOI: https://doi.org/10.17559/tv-20211130024245