Publication | Closed Access
Security threats in cloud computing
33
Citations
17
References
2015
Year
Unknown Venue
Secure ServiceBrief TaxonomyThreat (Computer)EngineeringIntrusion Detection SystemInformation SecurityCloud ComputingDenial-of-service AttackIntrusion DetectionData PrivacySecurityInformation ForensicsCloud Computing SecurityComputer ScienceTcp Flood AttackData SecurityCryptography
This paper reports a detailed analysis and categorization of various security threats in a cloud computing environment along with a brief taxonomy of intrusion detection system. The security attacks are launched on a private cloud and the detection and prevention are carriedout by using SNORT IDS. A portscan and TCP Flood attack are used for the analysis purpose.
| Year | Citations | |
|---|---|---|
Page 1
Page 1