Volume 20 No 7 (2022)
 Download PDF
Intrusion Detection System for Cloud Computing
Aditi Laxmi Giri , S. Annamalai
Abstract
Cloud computing seems to have become the favoured choice of every IT firm since it offers a flexible and pay-as-you-go services model to its consumers. Even after numerous advancements in cloud technology making. Despite the fact that cloud computing is the most widely used technology today, it still faces several challenges related to security which restricts users from using cloud services for confidential data
Keywords
Intrusion Detection System (IDS), Cybersecurity, Cyberattacks, Signature, Anomaly, Hypervisor, VM
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.