說明 |
1 online resource (xii, 85 pages) : illustrations, digital ; 24 cm |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
|
text file PDF rda |
系列 |
Studies in big data, 2197-6503 ; volume 52
|
|
Studies in big data ; volume 52
|
附註 |
1. Introduction -- 2. Host-based Intrusion Detection System -- 3. Network-based Intrusion Detection System -- 4. Data Security and Storage Module in Cloud -- 5. Conclusions and Research Direction |
|
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike |
Host Item |
Springer eBooks
|
主題 |
Cloud computing
|
|
Cloud computing -- Security measures
|
|
Communications Engineering, Networks
|
|
Systems and Data Security
|
|
Big Data
|
Alt Author |
Sharma, Subhash C., author
|
|
Peddoju, Sateesh K., author
|
|
SpringerLink (Online service)
|
|