A novel framework for intrusion detection in cloud
Proceedings of the Fifth International Conference on Security of Information and Networks
Review: A survey of intrusion detection techniques in Cloud
Journal of Network and Computer Applications
A survey on security issues and solutions at different layers of Cloud computing
The Journal of Supercomputing
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
Innovation is necessary to ride the inevitable tide of change. The buzzword of 2009 seems to be "cloud computing" which is a futuristic platform to provides dynamic resource pools, virtualization, and high availability and enables the sharing, selection and aggregation of geographically distributed heterogeneous resources for solving large-scale problems in science and engineering. But with this ever developing cloud concept, problems are arising from this “golden solution” in the enterprise arena. Preventing intruders from attacking the cloud infrastructure is the only realistic thing the staff, management and planners can foresee. Regardless of company size or volume and magnitude of the cloud, this paper explains how maneuver IT virtualization strategy could be used in responding to a denial of service attack. After picking up a grossly abnormal spike in inbound traffic, targeted applications could be immediately transferred to virtual machines hosted in another data center. We’re not reinventing the wheel. We have lots of technology and standardized solutions we can already use to engineer into the stack. We are just introducing them in the way least expected.