Investigation of intrusion detection technologies and systems for cloud computing networks

سال انتشار: 1401
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 176

فایل این مقاله در 13 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ITCT15_057

تاریخ نمایه سازی: 3 مرداد 1401

چکیده مقاله:

Today, cloud computing is recognized as a storage environment with many other applications for network users. This technology, which has made tremendous progress in data storage and its subtechnologies, has had problems with the rapid growth of other systems. Among these problems is the access of people to the cloud environment anytime and anywhere from any system. Therefore, the source system may be infected. Therefore, profiteers may ruin the network by sending an infected package. Therefore, it is necessary to consider a system that can detect package contamination. These intrusions, which are closed, can disrupt the network and reduce the speed of responding to users'requests to a great extent. Hence, intrusion detection systems were developed to detect, detect, and prevent any out-of-license packages. The need for intrusion detection systems in cloud computing networks, like other computer networks, is of great importance to prevent any problems, including data infiltrated into the network. In this research, the main preliminaries of using the intrusion detection system and the origin of its creation in the network are presented and then several previous methods inthe same field are examined.

کلیدواژه ها:

Network intrusion detection analysis ، Cloud computing ، Mapreduce

نویسندگان

Borhan kargarbideh

Master of Computer Engineering, Software Orientation, Islamic Azad University, Yazd Science and Research Branch, Yazd, Iran