If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments


Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in the era of an economic crisis. In addition to this revolution, several security matters emerged and especially the confrontation of malicious insiders. This paper proposes a methodology… (More)
DOI: 10.1186/s13677-014-0020-6


13 Figures and Tables

Slides referencing similar topics