Intrusion Optimal Path Attack detection using ACO for Cloud Computing

As the cloud infrastructure is simultaneously shared by millions of consumers, heinous use of cloud resources are also increasing. It makes ways to attackers to set up attacks by exploiting the vulnerabilities. And obviously, these attacks are leading to severe disasters as innocent consumers are un...

Full description

Bibliographic Details
Main Authors: Jaiganesh M., ShivajiRao G., Dhivya P., Udhayamoorthi M., Antony Kumar A. Vincent
Format: Article
Language:English
Published: EDP Sciences 2024-01-01
Series:E3S Web of Conferences
Online Access:https://www.e3s-conferences.org/articles/e3sconf/pdf/2024/02/e3sconf_icregcsd2023_02009.pdf