메뉴 건너뛰기




Volumn , Issue , 2012, Pages 461-465

Profiling-as-a-service in multi-tenant cloud computing environments

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING ENVIRONMENTS; COMPUTING PARADIGM; COMPUTING RESOURCE; IN-DEPTH UNDERSTANDING; MULTI TENANTS; MULTIPLE LAYERS; NETWORK ROUTERS; NETWORK TRAFFIC; POSITION PAPERS; PROPOSED ARCHITECTURES; SECURITY THREATS; TRAFFIC PATTERN; UNWANTED TRAFFIC;

EID: 84866384265     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCSW.2012.88     Document Type: Conference Paper
Times cited : (7)

References (30)
  • 1
    • 84866352048 scopus 로고    scopus 로고
    • DDoS attack hobbles major sites, including Amazon
    • C. News, "DDoS attack hobbles major sites, including Amazon," http://news.cnet.com/8301-30684-3-10421577-265.html.
    • C. News
  • 2
    • 84866345132 scopus 로고    scopus 로고
    • Google Introduces New Security Measures after Cyber-Attack
    • W. S. Journal, "Google Introduces New Security Measures After Cyber-Attack," http://online.wsj.com/article/BT-CO-20100112-716798.html.
    • W. S. Journal
  • 9
    • 85008008496 scopus 로고    scopus 로고
    • Internet traffic behavior profiling for network security monitoring
    • December
    • K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Internet traffic behavior profiling for network security monitoring," IEEE/ACM Transactions on Networking, vol. 16, pp. 1241-1252, December 2008.
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , pp. 1241-1252
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 10
    • 78649491247 scopus 로고    scopus 로고
    • Network Prefix-level Traffic Profiling: Characterizing, Modeling, and Evaluation
    • H. Jiang, Z. Ge, S. Jin, and J. Wang, "Network Prefix-level Traffic Profiling: Characterizing, Modeling, and Evaluation," Computer Networks, 2010.
    • (2010) Computer Networks
    • Jiang, H.1    Ge, Z.2    Jin, S.3    Wang, J.4
  • 13
    • 61749104382 scopus 로고    scopus 로고
    • Profiling and identification of P2P traffic
    • April
    • Y. Hu, D.-M. Chiu, and J. Lui, "Profiling and identification of P2P traffic," Computer Networks, vol. 53, no. 6, April 2009.
    • (2009) Computer Networks , vol.53 , Issue.6
    • Hu, Y.1    Chiu, D.-M.2    Lui, J.3
  • 15
    • 70349752533 scopus 로고    scopus 로고
    • Amazon, aws.amazon.com
    • Amazon, "Amazon Web Services," aws.amazon.com.
    • Amazon Web Services
  • 16
    • 77953221164 scopus 로고    scopus 로고
    • Securing Elasticity in the Cloud
    • June
    • D. Owens, "Securing Elasticity in the Cloud," Communications of the ACM, vol. 53, no. 6, pp. 46-51, June 2010.
    • (2010) Communications of the ACM , vol.53 , Issue.6 , pp. 46-51
    • Owens, D.1
  • 18
  • 22
    • 33745267664 scopus 로고    scopus 로고
    • PMeasure: A peer-to-peer measurement infrastructure for the Internet
    • June
    • W. Liu and R. Boutaba, "pMeasure: A peer-to-peer measurement infrastructure for the Internet," Computer Communications, vol. 29, no. 10, pp. 1665-1674, June 2006.
    • (2006) Computer Communications , vol.29 , Issue.10 , pp. 1665-1674
    • Liu, W.1    Boutaba, R.2
  • 25
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, July 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 26
    • 77956067021 scopus 로고    scopus 로고
    • Google-Wide Profiling: A Continuous Profiling Infrastructure for Data Centers
    • G. Ren, E. Tune, T. Moseley, Y. Shi, S. Rus, and R. Hundt, "Google-Wide Profiling: A Continuous Profiling Infrastructure for Data Centers," IEEE Micro, vol. 30, no. 4, pp. 65-79, 2010.
    • (2010) IEEE Micro , vol.30 , Issue.4 , pp. 65-79
    • Ren, G.1    Tune, E.2    Moseley, T.3    Shi, Y.4    Rus, S.5    Hundt, R.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.