Concepedia

Publication | Closed Access

Security threats in cloud computing

33

Citations

17

References

2015

Year

Abstract

This paper reports a detailed analysis and categorization of various security threats in a cloud computing environment along with a brief taxonomy of intrusion detection system. The security attacks are launched on a private cloud and the detection and prevention are carriedout by using SNORT IDS. A portscan and TCP Flood attack are used for the analysis purpose.

References

YearCitations

Page 1