Malware Detection in Cloud Computing Infrastructures
نویسندگان
چکیده
منابع مشابه
Review: A Study on Malware Detection in Cloud Network Targeting Cloud Infrastructures
Cloud computing is accepted by many companies to put their resources such as server, storage and applications on the cloud network somewhere on internet. The end user’s data is placed on cloud infrastructures with minimal cost which makes cloud computing is one of the promising and growing technology. In an abstract terms, the cloud computing technology enable the users to access the large infr...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملToward Antifragile Cloud Computing Infrastructures
Cloud computing systems are rapidly growing in scale and complexity. They are also changing dynamically as a result of dynamic addition and removal of system components, different execution environments, common updates and upgrades, runtime repairs, mobility of devices and more. Such large-scale, complex and dynamic cloud environments are prone to failures and performance anomalies. Thus, depen...
متن کاملCommunication Infrastructures for Cloud Computing
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The vi...
متن کاملData Management Challenges in Cloud Computing Infrastructures
The challenge of building consistent, available, and scalable data management systems capable of serving petabytes of data for millions of users has confronted the data management research community as well as large internet enterprises. Current proposed solutions to scalable data management, driven primarily by prevalent application requirements, limit consistent access to only the granularity...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2016
ISSN: 1545-5971
DOI: 10.1109/tdsc.2015.2457918