Attack Monitoring and Protection in Cloud Computing Environment through IDS

2021 
Cloud computing has now established itself as a significant computing model and processing method in almost all industries. The use of cloud computing is widespread in today's world. Cloud computing is becoming a part of every IT company due to its more versatile, secure, and PAYG (Pay-as-you-go) services, and the privacy and protection of the cloud is a major concern. In addition, the cloud is open and available. The next move is to enforce the snort intrusion detection system in the cloud environment, as well as new policies within snort, in order to improve the level of protection within the cloud environment and to examine the snort log report to ensure that the message in the log record is properly alerted. As a result, the administrator may make similar security choices in the event of an attack. The next step is enforcing a snort intrusion detection system in a cloud environment and new policies within the snort to improving the extent of security within the cloud environment and studying the snort log report, to see that it nicely alerts the message in the log record. So that administrators can take similar protection selections associated with attacks.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []