Cloud Intrusion Detection System Based on Exclusion Signature Matching Mechanism and Neural Network System
碩士 === 南台科技大學 === 資訊管理系 === 101 === In recent years, cloud computing is based on the powerful computing capabilities to provide convenient services. Malicious attackers may do malicious behaviors, such as: stealing user data, port scanning, attacks on virtual machine (VM) or hypervisor, backdoor cha...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
102
|
Online Access: | http://ndltd.ncl.edu.tw/handle/37825603103624041732 |