Cloud Intrusion Detection System Based on Exclusion Signature Matching Mechanism and Neural Network System

碩士 === 南台科技大學 === 資訊管理系 === 101 === In recent years, cloud computing is based on the powerful computing capabilities to provide convenient services. Malicious attackers may do malicious behaviors, such as: stealing user data, port scanning, attacks on virtual machine (VM) or hypervisor, backdoor cha...

Full description

Bibliographic Details
Main Authors: Chia-Yu Wu, 吳佳祐
Other Authors: Narn-Yih Lee
Format: Others
Language:zh-TW
Published: 102
Online Access:http://ndltd.ncl.edu.tw/handle/37825603103624041732