Survey on Identification of Hacker by Trapping Mechanism IJTSRD
Advanced persistence threat (APT) attack is to steal data rather than to cause damage to the network or organization. It is one of the initial phases in successful hacking of a system. Here, user’s behaviour is analysed based on previous behaviour such as posted data, time of posting, IP address and location of usage of […]
Survey on Security Threats in Cloud Computing IJTSRD
Cloud computing is a new and innovative technology, which serves resources as a service to cloud user. Cloud computing technology provides optimum utilization of computing resources in less cost, which attract organization to be part of cloud customer market. Day by day cloud users are getting increases. Cloud serves IaaS, PaaS, SaaS and DaaS as […]