Open Access Open Access  Restricted Access Subscription Access

Intrusion Detection Using Cloud Computing


Affiliations
1 PTU, Jalandhar, India
 

Decades of research in the field of networking, web and software services has led to development of Cloud Computing. Cloud computing is an end-user friendly utility computing service. Cloud computing endeavors service oriented architecture, lessens information technology aloft for the end-user, provides great extensibility and lowers the total cost of ownership. Relying on the numerous resources provided by the cloud, distinct layers can be formalized as "Infrastructure as a Service" (IaaS), "Platform as Service" (PaaS), "Software as a Service" (SaaS), through which applications can be conveyed to the clients over the web. SaaS has come up as an indispensable service for the technology vendors to endeavor a wide variety of application services, application products and on demand services to their clients as per their usage and requirements over the web. Despite of all the benefits arising out of cloud computing, the distributed denial of service attack (DDoS) poses a threat to the utility of the cloud computing for future.
User
Notifications
Font Size

Abstract Views: 222

PDF Views: 3




  • Intrusion Detection Using Cloud Computing

Abstract Views: 222  |  PDF Views: 3

Authors

R. P. S. Bedi
PTU, Jalandhar, India

Abstract


Decades of research in the field of networking, web and software services has led to development of Cloud Computing. Cloud computing is an end-user friendly utility computing service. Cloud computing endeavors service oriented architecture, lessens information technology aloft for the end-user, provides great extensibility and lowers the total cost of ownership. Relying on the numerous resources provided by the cloud, distinct layers can be formalized as "Infrastructure as a Service" (IaaS), "Platform as Service" (PaaS), "Software as a Service" (SaaS), through which applications can be conveyed to the clients over the web. SaaS has come up as an indispensable service for the technology vendors to endeavor a wide variety of application services, application products and on demand services to their clients as per their usage and requirements over the web. Despite of all the benefits arising out of cloud computing, the distributed denial of service attack (DDoS) poses a threat to the utility of the cloud computing for future.