Afficher la notice abrégée
dc.contributor.author |
Mehdi Ezzarii |
|
dc.contributor.author |
Hassan El Ghazi |
|
dc.contributor.author |
Hamid Elghazi |
|
dc.contributor.author |
Tayeb Sadiki |
|
dc.date.accessioned |
2019-06-02T09:44:00Z |
|
dc.date.available |
2019-06-02T09:44:00Z |
|
dc.date.issued |
2015-06-02 |
|
dc.identifier.uri |
http://e-biblio.univ-mosta.dz/handle/123456789/10557 |
|
dc.description.abstract |
Cloud computing is emerging as a promising IT
paradigm. Many challenges are still hanging ahead for the
Cloud to jump into the maturity stage. Thus, security is deemed
as a main challenge. In this paper, we develop the performance
of intrusion detection solutions (IDS) by analyzing their
performance in terms of recognition, security and capacity. The
main aim of our work is to help engineers to implement adequate
solution (IDS) depending on the security levels of cloud
computing. Our proposed method is based on two-stage. The
first stage consists on studying the needed requirements of IDS
solution in cloud computing. The second stage classifies security
attacks based on four levels. The classification identifies attacks
that we should treated with the fitting solution. |
en_US |
dc.publisher |
2015 International Conference on Cloud Technologies and Applications (CloudTech) |
en_US |
dc.subject |
Cloud Computing |
en_US |
dc.subject |
Security |
en_US |
dc.subject |
IDS |
en_US |
dc.subject |
Requirements;Architecture levels |
en_US |
dc.title |
Performance analysis of a two stage security approach in cloud computing |
en_US |
dc.type |
Article |
en_US |
Fichier(s) constituant ce document
Ce document figure dans la(les) collection(s) suivante(s)
Afficher la notice abrégée