CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

An overview of intrusion detection technologies and systems for cloud computing networks

عنوان مقاله: An overview of intrusion detection technologies and systems for cloud computing networks
شناسه ملی مقاله: SETT04_018
منتشر شده در چهارمین کنفرانس بین المللی علوم، مهندسی، تکنولوژی و کسب و کارهای فناورانه در سال 1401
مشخصات نویسندگان مقاله:

Reza Mohammadi Farsani - Master's degree in computer engineering, computer software, Payam Noor University, Ahvaz Branch, Khuzestan, Iran

خلاصه مقاله:
Cloud computing refers to the provision of on-demand computing services, from "Applications" to "Storage" and "Computational Power", through the Internet and with a pay-as-you-go method. Cloud computing can be both public and private. Public cloud services provide their services over the Internet for a fee. Private cloud services, on the other hand, only provide services to a certain number of people. These services are a system of networks that supply hosted services. There is also a hybrid option, which combines elements of both the public and private services. Today, cloud computing is recognized as a storage environment with many other applications for network users. This technology, which has made tremendous progress in data storage and its sub-technologies, has had problems with the rapid growth of other systems. Among these problems is the access of people to the cloud environment anytime and anywhere from any system. Therefore, the source system may be infected. Therefore, profiteers may ruin the network by sending an infected package. Therefore, it is necessary to consider a system that can detect package contamination. These intrusions, which are closed, can disrupt the network and reduce the speed of responding to users' requests to a great extent. Hence, intrusion detection systems were developed to detect, detect, and prevent any out-of-license packages. The need for intrusion detection systems in cloud computing networks, like other computer networks, is of great importance to prevent any problems, including data infiltrated into the network. In this research, the main preliminaries of using the intrusion detection system and the origin of its creation in the network are presented and then several previous methods in the same field are examined.

کلمات کلیدی:
Network intrusion detection analysis, Cloud computing, Mapreduce

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1543742/