Mobiles Agents and Virtual Firewall to Secure the Shared Network for Virtual Machines in IaaS cloud
Abstract
References
Index Terms
- Mobiles Agents and Virtual Firewall to Secure the Shared Network for Virtual Machines in IaaS cloud
Recommendations
Implementing Hy-IDS, Mobiles Agents and Virtual Firewall to Enhance the Security in IaaS Cloud
AbstractThe growth in customer requirements, big data analysis and pressures on response time, high costs of network platforms pushed companies to migrate to Cloud Computing providing on demand internet hosted IT services. The increase of Cloud users and ...
Secure Networking for Virtual Machines in the Cloud
CLUSTERW '12: Proceedings of the 2012 IEEE International Conference on Cluster Computing WorkshopsCloud computing improves utilization and flexibility of allocating computing resources while reducing the infrastructural costs. However, cloud technology is still proprietary in many cases and is tainted by security issues rooted in the multi-tenant ...
A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks
AbstractCloud is not exempted from the vulnerability of Distributed Denial of Service (DDoS) attack, a serious threat to any distributed network and has considerably less effective solutions to deploy in the network. This paper introduces a novel ...
Comments
Information & Contributors
Information
Published In
- Conference Chairs:
- Mohamed Lazaar,
- Youness Tabii,
- Mohamed Chrayah,
- Mohammed Al Achhab
In-Cooperation
- Ministère de I'enseignement supérieur: Ministère de I'enseignement supérieur
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 91Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in