Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditi...

Full description

Bibliographic Details
Main Author: M. Rezvani
Format: Article
Language:English
Published: Shahrood University of Technology 2018-07-01
Series:Journal of Artificial Intelligence and Data Mining
Subjects:
Online Access:http://jad.shahroodut.ac.ir/article_1087_fe882655bef00e1f3d718332e1ca46ef.pdf