Security of virtual networks in cloud computing for education
| dc.contributor.author | Achraf Bousselham | |
| dc.contributor.author | Tayeb Sadiki | |
| dc.date.accessioned | 2019-06-02T09:47:25Z | |
| dc.date.available | 2019-06-02T09:47:25Z | |
| dc.date.issued | 2014-11-25 | |
| dc.description.abstract | Cloud Computing emerge as new IT paradigm, which aims to provide applications delivered as services over the Internet and the hardware and systems software in the data centers that provide those services, by sharing resources to achieve coherence and economies of scale . However, one of the most important occupations of cloud computing today is to ensure the security of the infrastructure. This paper brings an introduction to the virtualization in a cloud environment. In the first place we will describe the principle of operation of a virtual network in the platform Xen, then we will discuss some possible attacks on these networks. In the end, we will introduce an analysis of some models of IDS applied to the cloud computing. | en_US |
| dc.identifier.uri | http://e-biblio.univ-mosta.dz/handle/123456789/10560 | |
| dc.publisher | 2014 International Conference on Web and Open Access to Learning (ICWOAL) | en_US |
| dc.subject | Cloud computing | en_US |
| dc.subject | Security | en_US |
| dc.subject | IDS | en_US |
| dc.subject | Xen | en_US |
| dc.subject | Attack | en_US |
| dc.subject | Vulnerability | en_US |
| dc.subject | IAAS | en_US |
| dc.title | Security of virtual networks in cloud computing for education | en_US |
| dc.type | Article | en_US |