Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditi...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Shahrood University of Technology
2018-07-01
|
Series: | Journal of Artificial Intelligence and Data Mining |
Subjects: | |
Online Access: | http://jad.shahroodut.ac.ir/article_1087_fe882655bef00e1f3d718332e1ca46ef.pdf |