List of Figures
Figure 3.0.1 Feature extraction. VIII
Figure 3.0.2 Event processing. VIII
Figure 3.8.1 Basic Architecture of Bayesian Enabled Network XI
The Problem
Cloud Network security is very significant when it comes to online data and transactions. Attackers often examine vulnerabilities within the cloud system. There are malwares and viruses that can be easily detected and those that cannot be detected easily. With advance technology and increase in computing knowledge, network attackers use sophisticated software that can beat most antiviruses and firewalls hence accessing the system without anyone noticing them (Kumar, 2015). Malicious code also referred to as (malware) often grow ...