Review of Intrusion Detection System for Cloud Computing

Download Now
Provided by: International Journal of Engineering Technology & Management Research (IJETMR)
Topic: Security
Format: PDF
Now-a-days a single server handles the multiple requests from the user. Where the server has to process all the requests from the users simultaneously, so the processing time will be high. This may lead to loss of data and packets may be delayed and corrupted. Thereby the server cannot process the query from the user in a proper manner so processing time increases. It may lead to traffic and congestion. To overcome this concept of cloud computing is thus invoked. Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission.
Download Now

Find By Topic