Intrusion detection system in secure shell traffic in cloud environment

Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade detection. Many traditional attack detection techniques have been prop...

Full description

Saved in:
Bibliographic Details
Main Authors: Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Behzadi, Mostafa, Mahmod, Ramlan, Mustapha, Norwati
Format: Article
Language:English
Published: Science Publications 2014
Online Access:http://psasir.upm.edu.my/id/eprint/34251/1/34251.pdf
http://psasir.upm.edu.my/id/eprint/34251/
http://thescipub.com/abstract/10.3844/jcssp.2014.2029.2036
Tags: Add Tag
No Tags, Be the first to tag this record!