Intrusion detection system design of cloud computing based on abnormal traffic identification
by Sunan Wang; Yingying Li; Xin Zhao; Bin Wang
International Journal of Reasoning-based Intelligent Systems (IJRIS), Vol. 7, No. 3/4, 2015

Abstract: With the ever increasing network security risk factor, network intrusion detection information needed to solve many computational costs, timeliness of a series of technical problems. This article analysed the background of intrusion detection system, generalising the high performance network invade to examine the technique research development condition, then put forward a new intrude detection system of cloud calculate network. Using cloud computing platform, we can quickly detect anomaly network traffic and intrusion detection data. It not only extends the system administrator's security management capabilities, including security auditing, monitoring, attack recognition and traceability, but also improve information security system's integrity and availability.

Online publication date: Mon, 09-Nov-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Reasoning-based Intelligent Systems (IJRIS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com