2023
DOI: 10.36893/jnao.2023.v14i2.286-292
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Unsaturated Attacks in Virtualized Infrastructures With Big Data Analytics in Cloud Computing

Boddupally Vinod Kumar,
K Pranaya Vardhan,
Kurceti Subba Rao
et al.

Abstract: Security systems to protect virtualized cloud architecture typically include two types of malware detection and security analysis. Detecting malware typically involves two steps, monitoring the hotspots at various points in the virtualized infrastructure, and then using a regularly updated attack signature database to detect the presence of malware. 'Attack. It allows real-time detection of attacks, the use of special signature databases that are vulnerable to zero- day attacks that do not have attack signatur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 8 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?