ABSTRACT

We are also being exposed to a new world where the tools used as part of cloud computing are also used by malicious characters as a means to infect and control

our systems. In the past, there was oen a clear di erentiation between “legitimate” trac and “malicious” trac. It was simple to create signatures to detect the evil and leave the benign. Now those lines are blurred and confused.