Mostrar el registro sencillo del ítem

dc.contributor.authorAchbarou, Omar
dc.contributor.authorEl kiram, My Ahmed
dc.contributor.authorEl Bouanani, Salim
dc.date2017-03
dc.date.accessioned2021-08-25T10:26:57Z
dc.date.available2021-08-25T10:26:57Z
dc.identifier.issn1989-1660
dc.identifier.urihttps://reunir.unir.net/handle/123456789/11732
dc.description.abstractCloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.es_ES
dc.language.isoenges_ES
dc.publisherInternational Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)es_ES
dc.relation.ispartofseries;vol. 4, nº 3
dc.relation.urihttps://ijimai.org/journal/bibcite/reference/2568es_ES
dc.rightsopenAccesses_ES
dc.subjectsecurityes_ES
dc.subjectcloud computinges_ES
dc.subjectattackes_ES
dc.subjectIJIMAIes_ES
dc.titleSecuring Cloud Computing from Different Attacks Using Intrusion Detection Systemses_ES
dc.typearticlees_ES
reunir.tag~IJIMAIes_ES
dc.identifier.doihttp://doi.org/10.9781/ijimai.2017.439


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem