Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.
Telecommunication. --- Computer security. --- Big data. --- Communications Engineering, Networks. --- Systems and Data Security. --- Big Data. --- Cloud computing. --- Electronic data processing --- Web services --- Distributed processing --- Data sets, Large --- Large data sets --- Data sets --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Protection --- Security measures
Choose an application
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.
Telecommunication technology --- Mass communications --- Computer architecture. Operating systems --- Information systems --- cloud computing --- informatica --- tekstverwerking --- gegevensanalyse --- computerbeveiliging --- communicatietechnologie
Choose an application
Telecommunication technology --- Mass communications --- Computer architecture. Operating systems --- Information systems --- cloud computing --- informatica --- tekstverwerking --- gegevensanalyse --- computerbeveiliging --- communicatietechnologie
Listing 1 - 3 of 3 |
Sort by
|