Intrusion detection system in secure shell traffic in cloud environment
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade detection. Many traditional attack detection techniques have been prop...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publications
2014
|
Online Access: | http://psasir.upm.edu.my/id/eprint/34251/1/34251.pdf |