UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 5
May-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1905457


Registration ID:
209768

Page Number

374-380

Share This Article


Jetir RMS

Title

Finding Intrusion Detection Using IP and MAC address tracing in Cloud Computing network

Abstract

This paper indicates how we can spare secret information from an interloper or any sort of spillage of the information by utilizing private cloud and dab net advancements With the expanding notoriety of distributed computing idea and its accessibility empowers increasingly association to change their condition to cloud based condition. This paper manages the security of information or any record which association need to keep that classified or mystery through cloud administrations with simple equipment necessity and along these lines remotely getting to every one of those applications introduced on the arrangement of the association and just chose mac address locations will given the rights to download that document from private cloud and get to that record, likewise alluded as "Information security" in the paper. This approach can definitely limit the theft of the secret information and furthermore with the expanding utilization of fast web; this idea appears to be more coherent and effective. The application which is utilized for executing this idea is of most extreme significance in light of the fact that here it's the application which specifically communicate with administrations gave by utilizing private cloud. Linux is utilized here due to its security and adaptability. There are couple of more explanations behind picking Linux as it is lightweight and more secure

Key Words

Cloud, private cloud , data security, intruder detection system, diffie hellman, split and merge algorithms, File transfer Protocol, AES algorithm.

Cite This Article

"Finding Intrusion Detection Using IP and MAC address tracing in Cloud Computing network", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 5, page no.374-380, May-2019, Available :http://www.jetir.org/papers/JETIR1905457.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Finding Intrusion Detection Using IP and MAC address tracing in Cloud Computing network", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 5, page no. pp374-380, May-2019, Available at : http://www.jetir.org/papers/JETIR1905457.pdf

Publication Details

Published Paper ID: JETIR1905457
Registration ID: 209768
Published In: Volume 6 | Issue 5 | Year May-2019
DOI (Digital Object Identifier):
Page No: 374-380
Country: FARIDABAD, HARYANA, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002833

Print This Page

Current Call For Paper

Jetir RMS