메뉴 건너뛰기




Volumn , Issue , 2011, Pages 332-341

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

Author keywords

Cloud computing; collaborative IDPS; distributed IDPS; intrusion detection

Indexed keywords

ARCHITECTURAL LEVELS; CLOUD SERVICES; COLLABORATIVE IDPS; COMPUTING ENVIRONMENTS; DATA-DRIVEN; DISTRIBUTED IDPS; INTRUSION DETECTION AND PREVENTION; INTRUSION DETECTION AND PREVENTION SYSTEMS; SECURITY ISSUES; SECURITY MECHANISM; TRUST MANAGEMENT;

EID: 84857574309     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4108/icst.collaboratecom.2011.247158     Document Type: Conference Paper
Times cited : (51)

References (28)
  • 1
    • 84857609306 scopus 로고    scopus 로고
    • NIST SP SOO-1 45, The NIST Definition of Cloud Computing, NIST Special Publication SOO-145, January
    • NIST SP SOO-1 45, The NIST Definition of Cloud Computing, http://csrc.nist. gov/publications/drafts/SOO-1 45IDraft-SP-SOO-1 45-clouddefinition. pdf, NIST Special Publication SOO-145, January 2011 .
    • (2011)
  • 8
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defe nse mechanisms
    • J. Mirkovic, and P. Reiher, A taxonomy of DDoS attack and DDoS defe nse mechanisms, ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, 2004.
    • (2004) ACM SIGCOMM Computer Communications Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 9
    • 33846198398 scopus 로고    scopus 로고
    • Protecting host-based intrusion detectors through virtual machines
    • April
    • M. Laureano, C. Maziero, and E. Jamhour, Protecting host-based intrusion detectors through virtual machines, Computer Networks, vol. 51 , no. 5, pp. 1 275-1 283, April 2007.
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1275-1283
    • Laureano, M.1    Maziero, C.2    Jamhour, E.3
  • 11
    • 74849123192 scopus 로고    scopus 로고
    • A review of classification methods for network vulnerability
    • San Antonio, TX, October 11-14
    • S. Jin, Y. Wang, X. Cui, and X. Yun A review of classification methods for network vulnerability, in Systems, Man and Cybernetics (SMC ' 09), San Antonio, TX, October 1 1-1 4, 2009.
    • (2009) Systems, Man and Cybernetics (SMC ' 09
    • Jin, S.1    Wang, Y.2    Cui, X.3    Yun, X.4
  • 12
    • 85085406935 scopus 로고    scopus 로고
    • Matching attack patte rns to security vulne rabilities in software-intensive system designs
    • May
    • M. Gegick, and L. Williams Matching attack patte rns to security vulne rabilities in software-intensive system designs, SIGSOFT Softw. Eng. Notes, Vol. 30, no. 4, pp. 1-7, May 2005.
    • (2005) SIGSOFT Softw. Eng. Notes , vol.30 , Issue.4 , pp. 1-7
    • Gegick, M.1    Williams, L.2
  • 13
    • 78650608265 scopus 로고    scopus 로고
    • Taxonomy and classification of automatic monitoring of program security vulnerability exploitations
    • February
    • H. Shahriar, and M. Zulkernine Taxonomy and classification of automatic monitoring of program security vulnerability exploitations, Journal of Systems and Software, Vol. 84, no. 2, pp. 250-269, February 2011 .
    • (2011) Journal of Systems and Software , vol.84 , Issue.2 , pp. 250-269
    • Shahriar, H.1    Zulkernine, M.2
  • 19
    • 84944738739 scopus 로고    scopus 로고
    • Collaborative intrusion detection system (ClDS): A framework for accurate and efficient IDS
    • December
    • w. Yu-Sung, B. Foo, Y. Mei, and S. Bagchi Collaborative intrusion detection system (ClDS): A framework for accurate and efficient IDS, 19th Annual Computer Security Applications Conference, pp. 234-244, December 2003.
    • (2003) 19th Annual Computer Security Applications Conference , pp. 234-244
    • Yu-Sung, W.1    Foo, B.2    Mei, Y.3    Bagchi, S.4
  • 20
    • 84857536386 scopus 로고    scopus 로고
    • NIST SP 800-30, Risk Management Guide for Iriformation Te chnology Systems, Publication 800-30, July
    • NIST SP 800-30, Risk Management Guide for Iriformation Te chnology Systems, http://csrc.nist. gov/publications/nistpubs/800-30/sp800-30.pdf, NIST Special Publication 800-30, July 2002.
    • (2002)
  • 22
    • 0003411763 scopus 로고    scopus 로고
    • Technical Report CSE-95 1 O , Department of Computer Science, University of California at Davis, May 1
    • M. Bishop A Taxonomy of Unix System and Network Vulne rabilitie s, Technical Report CSE-9 5 1 O , Department of Computer Science, University of California at Davis, May 1995.
    • A Taxonomy of Unix System and Network Vulne Rabilities , pp. 995
    • Bishop, M.1
  • 25
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • H. Takabi, J. B. D. Joshi, and G. J. Ahn, Security and Privacy Challenges in Cloud Computing Environments, IEEE Security and Privacy, Vol. 8, No. 6, pp. 25-3 1 , 2010.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.6 , pp. 25-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.J.3
  • 26
    • 77954931494 scopus 로고    scopus 로고
    • Intrusion detection for grid and cloud computing
    • July-Aug.
    • K. Vieira, A. Schulter, C. B. WestphaU, and C. M. Westphall, Intrusion Detection for Grid and Cloud Computing, In IT Professional, Vol. 1 2 , no. 4, pp. 38-43, July-Aug. 20 1 0.
    • (2010) IT Professional , vol.12 , Issue.4 , pp. 38-43
    • Vieira, K.1    Schulter, A.2    Westpha, C.B.3    Westphall, C.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.