A Review on Various Attack Detection Techniques in Cloud Architecture

Cloud computing has been envisioned as the next generation architecture of the IT enterprise. Today’s organizations, but there exist a many security vulnerabilities. Cloud computing dynamically allocate, deploy, redeploy and cancel the services on the basis of demand. However, cloud computing inevitable possess new challenges because traditional security mechanisms being followed are in sufficient to safeguard the cloud assets. Cloud computing is easily can be targeted by the attackers. A group of malicious users or illegitimate users are attack on system and denial the services of legitimate users.

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Resource Details

Provided by:
International Journal of Advanced Research in Computer Engineering & Technology
Topic:
Cloud
Format:
PDF