Open Access
Subscription Access
Intrusion Detection Using the Hop Count Inspection Method (HCIM) Algorithm
Intrusion Detection and Cloud Computing are the latest buzzword now a day's and emerges as one of the key service of the Utility computing which builds on decade of research in the field of networking, web and software services. Cloud Computing offers a service oriented architecture, reduced information technology overhead for the end-user, great flexibility and reduced total cost of ownership. Depending on the type of resources provided by the Cloud, distinct layers can be defined as Infrastructure as a Service (IaaS), Platform as service (PaaS) and Software as a Service (SaaS), from which later will deliver various Applications to the clients over the Web. SaaS has become a vital service for the technology vendors to provide a wide variety of application services, application products and on-demand services to their clients according to their utility and demand over the web as a key channel. But recent attacks on the clouds especially Distributed Denial of Service (DDoS) poses as a crucial threat to this key technology of the future.
User
Font Size
Information
Abstract Views: 205
PDF Views: 1