Intrusion Detection and Severity Analysis in Cloud

@inproceedings{Wagh2015IntrusionDA,
  title={Intrusion Detection and Severity Analysis in Cloud},
  author={Sharmila. K. Wagh and Ankita Nickey and Sagar Uttekar and Rohit Chawla},
  year={2015}
}
Cloud computing takes the technology, services and applications that are close to those on the internet and turns them into a selfservice utility. Hence, cloud management and security has become an important and growing area of technology. However, Clouds introduce security challenges which need to be addressed to facilitate widespread adoption. This paper underpins the efforts to address one of the important and significant issue of cloud security i.e. intrusion detection and severity analysis… CONTINUE READING

Figures from this paper.

References

Publications referenced by this paper.
SHOWING 1-4 OF 4 REFERENCES

Johnny Wong,"A taxonomy of intrusion response systems

Natalia Stakhanova, Samik Basu
  • International Journal of Information and Security
  • 2007

EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances

Phillip Porras, Peter G. Neumann, Ravenswood Avenue
  • CCS 2002
  • 1997