All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

A Profile based Network Intrusion Detection and Prevention System for securing Cloud Environment

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27740%2F13%3A86089343" target="_blank" >RIV/61989100:27740/13:86089343 - isvavai.cz</a>

  • Result on the web

    <a href="http://dspace.vsb.cz/bitstream/handle/10084/96351/IJ-distributed-sensor-network-2013-364575-gupta.pdf?sequence=1" target="_blank" >http://dspace.vsb.cz/bitstream/handle/10084/96351/IJ-distributed-sensor-network-2013-364575-gupta.pdf?sequence=1</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1155/2013/364575" target="_blank" >10.1155/2013/364575</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    A Profile based Network Intrusion Detection and Prevention System for securing Cloud Environment

  • Original language description

    Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include software as a service, platform as a service, and infrastructure as a service. Cloud computing virtually and dynamically distributes the computing and data resources to a variety of users, based on their needs, with the use of virtualization technologies. As Cloud computing is a shared facility and is accessed remotely, it is vulnerable to various attacks including host and network based attacks (Brown 2012, and Grance 2009) and hence requires immediate attention. This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outside

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: IT4Innovations Centre of Excellence</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2013

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    International Journal of Distributed Sensor Networks

  • ISSN

    1550-1329

  • e-ISSN

  • Volume of the periodical

    2013

  • Issue of the periodical within the volume

    364575

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    12

  • Pages from-to

    1-12

  • UT code for WoS article

    000317207100001

  • EID of the result in the Scopus database