A Profile based Network Intrusion Detection and Prevention System for securing Cloud Environment
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27740%2F13%3A86089343" target="_blank" >RIV/61989100:27740/13:86089343 - isvavai.cz</a>
Výsledek na webu
<a href="http://dspace.vsb.cz/bitstream/handle/10084/96351/IJ-distributed-sensor-network-2013-364575-gupta.pdf?sequence=1" target="_blank" >http://dspace.vsb.cz/bitstream/handle/10084/96351/IJ-distributed-sensor-network-2013-364575-gupta.pdf?sequence=1</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1155/2013/364575" target="_blank" >10.1155/2013/364575</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
A Profile based Network Intrusion Detection and Prevention System for securing Cloud Environment
Popis výsledku v původním jazyce
Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include software as a service, platform as a service, and infrastructure as a service. Cloud computing virtually and dynamically distributes the computing and data resources to a variety of users, based on their needs, with the use of virtualization technologies. As Cloud computing is a shared facility and is accessed remotely, it is vulnerable to various attacks including host and network based attacks (Brown 2012, and Grance 2009) and hence requires immediate attention. This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outside
Název v anglickém jazyce
A Profile based Network Intrusion Detection and Prevention System for securing Cloud Environment
Popis výsledku anglicky
Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include software as a service, platform as a service, and infrastructure as a service. Cloud computing virtually and dynamically distributes the computing and data resources to a variety of users, based on their needs, with the use of virtualization technologies. As Cloud computing is a shared facility and is accessed remotely, it is vulnerable to various attacks including host and network based attacks (Brown 2012, and Grance 2009) and hence requires immediate attention. This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outside
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
<a href="/cs/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: Centrum excelence IT4Innovations</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2013
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
International Journal of Distributed Sensor Networks
ISSN
1550-1329
e-ISSN
—
Svazek periodika
2013
Číslo periodika v rámci svazku
364575
Stát vydavatele periodika
US - Spojené státy americké
Počet stran výsledku
12
Strana od-do
1-12
Kód UT WoS článku
000317207100001
EID výsledku v databázi Scopus
—