Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is IP Based Attack

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Generally, IP based attacked is refered as IP Spoofing, in which attacker drafted packets with spoofed source IP address, then oppressed the privilege of authorized user that employ authentication based on IP address. A spoofing attack is occur when unauthorized party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware, or bypass access controls.
Published in Chapter:
Security Architecture for Cloud Computing
Robin Singh Bhadoria (Indian Institute of Technology Indore, India)
DOI: 10.4018/978-1-4666-6559-0.ch003
Abstract
Clouds need to address three security issues: confidentiality, integrity, and availability. Security architecture for cloud computing is designed based on the functional architecture. The approach is to enhance the components of a functional architecture with additional components providing various security services. This is an extension of SaaS concept to have several security components that are common to all application and services. Various cloud security issues are discussed in this chapter.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR