메뉴 건너뛰기




Volumn 36, Issue 1, 2013, Pages 42-57

A survey of intrusion detection techniques in Cloud

Author keywords

Cloud computing; Firewalls; Intrusion detection system; Intrusion prevention system

Indexed keywords

DETECTION TECHNIQUE; INTRUSION DETECTION SYSTEMS; INTRUSION PREVENTION SYSTEMS;

EID: 84870696413     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.05.003     Document Type: Review
Times cited : (732)

References (73)
  • 1
    • 70350408042 scopus 로고    scopus 로고
    • Website
    • Azure services platform, Website, 〈http://www.microsoft.com/ azure〉; 2011.
    • (2011) Azure Services Platform
  • 2
    • 80052586939 scopus 로고    scopus 로고
    • Website
    • Amazon web services, Website, 〈http://aws.amazon.com〉; 2011.
    • (2011) Amazon Web Services
  • 9
    • 12244275490 scopus 로고    scopus 로고
    • The utilization of artificial intelligence in a hybrid intrusion detection system
    • M. Botha, R. Solms, K. Perry, E. Loubser, and G. Yamoyany The utilization of artificial intelligence in a hybrid intrusion detection system SAICSIT 2002 149 155
    • (2002) SAICSIT , pp. 149-155
    • Botha, M.1    Solms, R.2    Perry, K.3    Loubser, E.4    Yamoyany, G.5
  • 11
    • 78650219479 scopus 로고    scopus 로고
    • On securing untrusted clouds with cryptography
    • Y. Chen, and R. Sion On securing untrusted clouds with cryptography In WPES 10 2010 109 114
    • (2010) WPES , vol.10 , pp. 109-114
    • Chen, Y.1    Sion, R.2
  • 14
    • 13544269338 scopus 로고    scopus 로고
    • Application of svm and ann for intrusion detection
    • W.-H. Chen, S.-H. Su, and H.-P. Shen Application of svm and ann for intrusion detection Computer Oper Res 32 10 2005 2617 2634
    • (2005) Computer Oper Res , vol.32 , Issue.10 , pp. 2617-2634
    • Chen, W.-H.1    Su, S.-H.2    Shen, H.-P.3
  • 18
    • 84870707064 scopus 로고    scopus 로고
    • Eucalyptus, Website
    • Eucalyptus, Website, 〈http://eucalyptus.cs.ucsb.edu/〉; 2011.
    • (2011)
  • 20
    • 84865005417 scopus 로고    scopus 로고
    • Website
    • Google apps, Website, 〈http:/www.google.com〉; 2011.
    • (2011) Google Apps
  • 21
    • 84870680474 scopus 로고    scopus 로고
    • Google app engine, Website
    • Google app engine, Website, 〈http://code.google.com/appengine/ 〉; 2011.
    • (2011)
  • 26
    • 33745881331 scopus 로고    scopus 로고
    • Application of neural networks in network control and information security
    • A. Grediaga, F. Ibarra, F. García, B. Ledesma, and F. Brotons Application of neural networks in network control and information security LNCS 2006 208 213
    • (2006) LNCS , pp. 208-213
    • Grediaga, A.1    Ibarra, F.2    García, F.3    Ledesma, B.4    Brotons, F.5
  • 33
    • 78751558599 scopus 로고    scopus 로고
    • Anomaly network intrusion detection system based on distributed time-delay neural network
    • L.M. Ibrahim Anomaly network intrusion detection system based on distributed time-delay neural network Journal of Engineering Science and Technology 5 4 2010 457 471
    • (2010) Journal of Engineering Science and Technology , vol.5 , Issue.4 , pp. 457-471
    • Ibrahim, L.M.1
  • 43
    • 4344588856 scopus 로고    scopus 로고
    • Detecting new forms of network intrusion using genetic programming
    • W. Lu, and I. Traore Detecting new forms of network intrusion using genetic programming Computational Intelligence 20 3 2004 475 494
    • (2004) Computational Intelligence , vol.20 , Issue.3 , pp. 475-494
    • Lu, W.1    Traore, I.2
  • 47
    • 84870658614 scopus 로고    scopus 로고
    • White Paper
    • Martin L, White Paper, 〈http://www.lockheedmartin.com/data/assets/ isgs/documents/CloudComputingWhitePaper.pdf〉; 2010.
    • (2010)
    • Martin, L.1
  • 50
    • 59449108823 scopus 로고    scopus 로고
    • Website
    • NIST: National vulnerability database, Website, Available from: 〈http://web.nvd.nist.gov/view/ vuln/detail?vulnId=CVE-〉 2009-3733; 2011.
    • (2011) NIST: National Vulnerability Database , pp. 2009-3733
  • 51
    • 84870690293 scopus 로고    scopus 로고
    • Opennebula, Website
    • Opennebula, Website, 〈http://www.opennebula.org〉; 2011.
    • (2011)
  • 52
    • 55549097262 scopus 로고    scopus 로고
    • Subverting VistaTM Kernel for Fun and Profit
    • Rutkowska J, Subverting VistaTM Kernel for Fun and Profit, Black Hat Conference; 2006.
    • (2006) Black Hat Conference
    • Rutkowska, J.1
  • 54
    • 84870661024 scopus 로고    scopus 로고
    • Secure cloud computing based on mutual intrusion detection system
    • S. Ram Secure cloud computing based on mutual intrusion detection system International journal of computer application 2 1 2012 57 67
    • (2012) International Journal of Computer Application , vol.2 , Issue.1 , pp. 57-67
    • Ram, S.1
  • 56
    • 84870670506 scopus 로고    scopus 로고
    • SANS Institute InfoSec Reading Room 2002
    • Sequeira D, Intrusion Prevention Systems- Security's Silver Bullet? SANS Institute InfoSec Reading Room 2002, 〈http://www.sans.org/reading-room/ whitepapers/detection/intrusion-prevention-systems-securitys-silver-bullet-366? show=366.php&cat=detection〉; 2002.
    • (2002) Intrusion Prevention Systems- Security's Silver Bullet?
    • Sequeira, D.1
  • 57
    • 67349229828 scopus 로고    scopus 로고
    • A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
    • M.-Y. Su, G.-J. Yu, and C.-Y. Lin A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach Computer Security 2009 301 309
    • (2009) Computer Security , pp. 301-309
    • Su, M.-Y.1    Yu, G.-J.2    Lin, C.-Y.3
  • 58
    • 84870354202 scopus 로고    scopus 로고
    • Economic denial of sustainability (EDoS) in cloud services using HTTP and XML based DDoS attacks
    • S.V. Sandar, and S. Shenai Economic denial of sustainability (EDoS) in cloud services using HTTP and XML based DDoS attacks International Journal of Computer Applications 41 20 2012 11 16
    • (2012) International Journal of Computer Applications , vol.41 , Issue.20 , pp. 11-16
    • Sandar, S.V.1    Shenai, S.2
  • 59
    • 42449117164 scopus 로고    scopus 로고
    • Recommendations of the National Institute of Standards and Technology 457-471
    • Scarfone K, Mell P, Guide to intrusion detection and prevention systems (IDPS), Recommendations of the National Institute of Standards and Technology, 〈http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf〉; 2007:175-180 457-471
    • (2007) Guide to Intrusion Detection and Prevention Systems (IDPS) , pp. 175-180
    • Scarfone, K.1
  • 66
    • 84870687017 scopus 로고    scopus 로고
    • Firewall
    • Firewall, Telecom-Network Tech, 〈http://teleco-network.blogspot.com/ 〉; 2011.
    • (2011) Telecom-Network Tech
  • 67
    • 84870681924 scopus 로고    scopus 로고
    • Website
    • Denial-of-service attack, Website, 〈http://en.wikipedia.org/wiki/ Denial-of-service-attack〉; 2011.
    • (2011) Denial-of-service Attack
  • 68
    • 78349251588 scopus 로고    scopus 로고
    • Website
    • Snort-Home page, Website, 〈https://www.snort.org/〉; 2011.
    • (2011) Snort-Home Page
  • 69
    • 84870718685 scopus 로고    scopus 로고
    • Website
    • The concept of Intrusion Detection System, Website, 〈http:// maltainfosec.org/archives/26-The-concept-of-Intrusion-Detection-Systems. html〉 (2011).
    • (2011) The Concept of Intrusion Detection System
  • 70
    • 84870686445 scopus 로고    scopus 로고
    • XArp 2.2.2, Website
    • XArp 2.2.2, Website, 〈http://www.filecluster.com/Network-Tools/ Network-Monitoring/Download-XArp.html〉; 2011.
    • (2011)
  • 71
    • 84870653819 scopus 로고    scopus 로고
    • IBM Research-Zurich, Website
    • IBM Research-Zurich, Website, 〈http://www.zurich.ibm.com/csc/ security/securevirt.html#top〉; 2011.
    • (2011)
  • 72
    • 84870670061 scopus 로고    scopus 로고
    • Javvin, Website
    • IPS: Intrusion Prevention System. Javvin, Website, 〈http://www. javvin.com/networksecurity/IPS.html〉; 2011.
    • (2011) IPS: Intrusion Prevention System


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.