Open Access Open Access  Restricted Access Subscription Access

Intrusion Detection Using the Hop Count Inspection Method (HCIM) Algorithm


Affiliations
1 PTU, Jalandhar, India
 

Intrusion Detection and Cloud Computing are the latest buzzword now a day's and emerges as one of the key service of the Utility computing which builds on decade of research in the field of networking, web and software services. Cloud Computing offers a service oriented architecture, reduced information technology overhead for the end-user, great flexibility and reduced total cost of ownership. Depending on the type of resources provided by the Cloud, distinct layers can be defined as Infrastructure as a Service (IaaS), Platform as service (PaaS) and Software as a Service (SaaS), from which later will deliver various Applications to the clients over the Web. SaaS has become a vital service for the technology vendors to provide a wide variety of application services, application products and on-demand services to their clients according to their utility and demand over the web as a key channel. But recent attacks on the clouds especially Distributed Denial of Service (DDoS) poses as a crucial threat to this key technology of the future.
User
Notifications
Font Size

Abstract Views: 143

PDF Views: 1




  • Intrusion Detection Using the Hop Count Inspection Method (HCIM) Algorithm

Abstract Views: 143  |  PDF Views: 1

Authors

R. P. S. Bedi
PTU, Jalandhar, India

Abstract


Intrusion Detection and Cloud Computing are the latest buzzword now a day's and emerges as one of the key service of the Utility computing which builds on decade of research in the field of networking, web and software services. Cloud Computing offers a service oriented architecture, reduced information technology overhead for the end-user, great flexibility and reduced total cost of ownership. Depending on the type of resources provided by the Cloud, distinct layers can be defined as Infrastructure as a Service (IaaS), Platform as service (PaaS) and Software as a Service (SaaS), from which later will deliver various Applications to the clients over the Web. SaaS has become a vital service for the technology vendors to provide a wide variety of application services, application products and on-demand services to their clients according to their utility and demand over the web as a key channel. But recent attacks on the clouds especially Distributed Denial of Service (DDoS) poses as a crucial threat to this key technology of the future.