Rules Based Enhancement in Cloud Intrusion Detection System Service

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
In cloud environment, chances of intrusion are more with cultivation of intruder's attacks because cloud computing is internet based computing where virtual servers provide software, Platform, Infrastructure or other computing resources to customer on pay-as-you-basis. With increment in need of computing services of cloud computing, demand of security as a service is also increasing with risks of vulnerabilities in cloud computing environment. Every cloud user wants to secure their resources which are shared by all users in cloud computing.

Find By Topic