-
1
-
-
70350408042
-
-
Website
-
Azure services platform, Website, 〈http://www.microsoft.com/ azure〉; 2011.
-
(2011)
Azure Services Platform
-
-
-
2
-
-
80052586939
-
-
Website
-
Amazon web services, Website, 〈http://aws.amazon.com〉; 2011.
-
(2011)
Amazon Web Services
-
-
-
4
-
-
70449558802
-
-
Ahmed M., Pal, R., Hossain, H.M., Bikas, M., Hasan, M.K., NIDS: A Network Based Approach to Intrusion Detection and Prevention, Computer Science and Information Technology - Spring Conference;2009: pp. 141-4.
-
(2009)
NIDS: A Network Based Approach to Intrusion Detection and Prevention, Computer Science and Information Technology - Spring Conference
, pp. 141-144
-
-
Ahmed, M.1
Pal, R.2
Hossain, H.M.3
Bikas, M.4
Hasan, M.K.5
-
7
-
-
58149102322
-
-
Department of Computer Science, University of California, San Diego
-
Brown DJ, Suckow B, Wang T, A Survey of Intrusion Detection Systems. Department of Computer Science, University of California, San Diego; 2002.
-
(2002)
A Survey of Intrusion Detection Systems
-
-
Brown, D.J.1
Suckow, B.2
Wang, T.3
-
9
-
-
12244275490
-
The utilization of artificial intelligence in a hybrid intrusion detection system
-
M. Botha, R. Solms, K. Perry, E. Loubser, and G. Yamoyany The utilization of artificial intelligence in a hybrid intrusion detection system SAICSIT 2002 149 155
-
(2002)
SAICSIT
, pp. 149-155
-
-
Botha, M.1
Solms, R.2
Perry, K.3
Loubser, E.4
Yamoyany, G.5
-
11
-
-
78650219479
-
On securing untrusted clouds with cryptography
-
Y. Chen, and R. Sion On securing untrusted clouds with cryptography In WPES 10 2010 109 114
-
(2010)
WPES
, vol.10
, pp. 109-114
-
-
Chen, Y.1
Sion, R.2
-
13
-
-
3042595031
-
Adaptive neuro-fuzzy intrusion detection systems
-
Chavan S, Shah K, Dave N, Mukherjee S, Adaptive neuro-fuzzy intrusion detection systems, IEEE international conference on information technology: coding and computing (ITCC04); 2004: pp 70-4.
-
(2004)
IEEE International Conference on Information Technology: Coding and Computing (ITCC04)
, pp. 70-74
-
-
Chavan, S.1
Shah, K.2
Dave, N.3
Mukherjee, S.4
-
14
-
-
13544269338
-
Application of svm and ann for intrusion detection
-
W.-H. Chen, S.-H. Su, and H.-P. Shen Application of svm and ann for intrusion detection Computer Oper Res 32 10 2005 2617 2634
-
(2005)
Computer Oper Res
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.-H.1
Su, S.-H.2
Shen, H.-P.3
-
18
-
-
84870707064
-
-
Eucalyptus, Website
-
Eucalyptus, Website, 〈http://eucalyptus.cs.ucsb.edu/〉; 2011.
-
(2011)
-
-
-
20
-
-
84865005417
-
-
Website
-
Google apps, Website, 〈http:/www.google.com〉; 2011.
-
(2011)
Google Apps
-
-
-
21
-
-
84870680474
-
-
Google app engine, Website
-
Google app engine, Website, 〈http://code.google.com/appengine/ 〉; 2011.
-
(2011)
-
-
-
26
-
-
33745881331
-
Application of neural networks in network control and information security
-
A. Grediaga, F. Ibarra, F. García, B. Ledesma, and F. Brotons Application of neural networks in network control and information security LNCS 2006 208 213
-
(2006)
LNCS
, pp. 208-213
-
-
Grediaga, A.1
Ibarra, F.2
García, F.3
Ledesma, B.4
Brotons, F.5
-
32
-
-
80052184968
-
Intrusion detection and response system for mobile phones
-
Houmansadr A, Zonouz SA, Berthier, R, Cloud-based, A. Intrusion detection and response system for mobile phones. In: Proceedings of the 2011 IEEE/IFIP 41st international conference on dependable systems and networks workshops; 2011: pp. 31-2.
-
(2011)
Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops
, pp. 31-32
-
-
Houmansadr, A.1
Zonouz, S.A.2
Berthier, R.3
Cloud-Based, A.4
-
33
-
-
78751558599
-
Anomaly network intrusion detection system based on distributed time-delay neural network
-
L.M. Ibrahim Anomaly network intrusion detection system based on distributed time-delay neural network Journal of Engineering Science and Technology 5 4 2010 457 471
-
(2010)
Journal of Engineering Science and Technology
, vol.5
, Issue.4
, pp. 457-471
-
-
Ibrahim, L.M.1
-
38
-
-
84872111291
-
Self-similarity based lightweight intrusion detection method for cloud computing
-
Kwon H, Kim,T, Yu, SJ, Kim HK. Self-similarity based lightweight intrusion detection method for cloud computing. In: Proceedings of the third international conference on intelligent information and database systems - Volume Part II; 2011: pp. 353-62.
-
(2011)
Proceedings of the Third International Conference on Intelligent Information and Database Systems
, Issue.PART II
, pp. 353-362
-
-
Kwon, H.1
Kim, T.2
Yu, S.J.3
Kim, H.K.4
-
41
-
-
78650034519
-
Research on intelligent intrusion prevention system based on snort
-
H. Li, and D. Liu Research on intelligent intrusion prevention system based on snort International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE), 1 2010 251 253
-
(2010)
International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE)
, vol.1
, pp. 251-253
-
-
Li, H.1
Liu, D.2
-
43
-
-
4344588856
-
Detecting new forms of network intrusion using genetic programming
-
W. Lu, and I. Traore Detecting new forms of network intrusion using genetic programming Computational Intelligence 20 3 2004 475 494
-
(2004)
Computational Intelligence
, vol.20
, Issue.3
, pp. 475-494
-
-
Lu, W.1
Traore, I.2
-
44
-
-
79955677448
-
Multi-level Intrusion detection system and log management in cloud computing
-
Lee, J-H, Park M-W, Eorn J-H, Chung T-M. Multi-level Intrusion detection system and log management in cloud computing. In: 13th International conference on advanced communication technology (ICACT); 2011, pp. 552-5.
-
(2011)
13th International Conference on Advanced Communication Technology (ICACT)
, pp. 552-555
-
-
Lee, H.J.1
Park, M.-W.2
Eorn, J.-H.3
Chung, T.-M.4
-
47
-
-
84870658614
-
-
White Paper
-
Martin L, White Paper, 〈http://www.lockheedmartin.com/data/assets/ isgs/documents/CloudComputingWhitePaper.pdf〉; 2010.
-
(2010)
-
-
Martin, L.1
-
50
-
-
59449108823
-
-
Website
-
NIST: National vulnerability database, Website, Available from: 〈http://web.nvd.nist.gov/view/ vuln/detail?vulnId=CVE-〉 2009-3733; 2011.
-
(2011)
NIST: National Vulnerability Database
, pp. 2009-3733
-
-
-
51
-
-
84870690293
-
-
Opennebula, Website
-
Opennebula, Website, 〈http://www.opennebula.org〉; 2011.
-
(2011)
-
-
-
52
-
-
55549097262
-
Subverting VistaTM Kernel for Fun and Profit
-
Rutkowska J, Subverting VistaTM Kernel for Fun and Profit, Black Hat Conference; 2006.
-
(2006)
Black Hat Conference
-
-
Rutkowska, J.1
-
54
-
-
84870661024
-
Secure cloud computing based on mutual intrusion detection system
-
S. Ram Secure cloud computing based on mutual intrusion detection system International journal of computer application 2 1 2012 57 67
-
(2012)
International Journal of Computer Application
, vol.2
, Issue.1
, pp. 57-67
-
-
Ram, S.1
-
56
-
-
84870670506
-
-
SANS Institute InfoSec Reading Room 2002
-
Sequeira D, Intrusion Prevention Systems- Security's Silver Bullet? SANS Institute InfoSec Reading Room 2002, 〈http://www.sans.org/reading-room/ whitepapers/detection/intrusion-prevention-systems-securitys-silver-bullet-366? show=366.php&cat=detection〉; 2002.
-
(2002)
Intrusion Prevention Systems- Security's Silver Bullet?
-
-
Sequeira, D.1
-
57
-
-
67349229828
-
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
-
M.-Y. Su, G.-J. Yu, and C.-Y. Lin A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach Computer Security 2009 301 309
-
(2009)
Computer Security
, pp. 301-309
-
-
Su, M.-Y.1
Yu, G.-J.2
Lin, C.-Y.3
-
58
-
-
84870354202
-
Economic denial of sustainability (EDoS) in cloud services using HTTP and XML based DDoS attacks
-
S.V. Sandar, and S. Shenai Economic denial of sustainability (EDoS) in cloud services using HTTP and XML based DDoS attacks International Journal of Computer Applications 41 20 2012 11 16
-
(2012)
International Journal of Computer Applications
, vol.41
, Issue.20
, pp. 11-16
-
-
Sandar, S.V.1
Shenai, S.2
-
59
-
-
42449117164
-
-
Recommendations of the National Institute of Standards and Technology 457-471
-
Scarfone K, Mell P, Guide to intrusion detection and prevention systems (IDPS), Recommendations of the National Institute of Standards and Technology, 〈http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf〉; 2007:175-180 457-471
-
(2007)
Guide to Intrusion Detection and Prevention Systems (IDPS)
, pp. 175-180
-
-
Scarfone, K.1
-
62
-
-
28444485027
-
An efficient network intrusion detection method based on information theory and genetic algorithm
-
Phoenix, AZ, USA
-
Xiao T, Qu G, Hariri S, Yousif M. An efficient network intrusion detection method based on information theory and genetic algorithm. In: Proceedings of the 24th IEEE international performance computing and communications conference (IPCCC '05), Phoenix, AZ, USA; 2005.
-
(2005)
Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC '05)
-
-
Xiao, T.1
Qu, G.2
Hariri, S.3
Yousif, M.4
-
66
-
-
84870687017
-
-
Firewall
-
Firewall, Telecom-Network Tech, 〈http://teleco-network.blogspot.com/ 〉; 2011.
-
(2011)
Telecom-Network Tech
-
-
-
67
-
-
84870681924
-
-
Website
-
Denial-of-service attack, Website, 〈http://en.wikipedia.org/wiki/ Denial-of-service-attack〉; 2011.
-
(2011)
Denial-of-service Attack
-
-
-
68
-
-
78349251588
-
-
Website
-
Snort-Home page, Website, 〈https://www.snort.org/〉; 2011.
-
(2011)
Snort-Home Page
-
-
-
69
-
-
84870718685
-
-
Website
-
The concept of Intrusion Detection System, Website, 〈http:// maltainfosec.org/archives/26-The-concept-of-Intrusion-Detection-Systems. html〉 (2011).
-
(2011)
The Concept of Intrusion Detection System
-
-
-
70
-
-
84870686445
-
-
XArp 2.2.2, Website
-
XArp 2.2.2, Website, 〈http://www.filecluster.com/Network-Tools/ Network-Monitoring/Download-XArp.html〉; 2011.
-
(2011)
-
-
-
71
-
-
84870653819
-
-
IBM Research-Zurich, Website
-
IBM Research-Zurich, Website, 〈http://www.zurich.ibm.com/csc/ security/securevirt.html#top〉; 2011.
-
(2011)
-
-
-
72
-
-
84870670061
-
-
Javvin, Website
-
IPS: Intrusion Prevention System. Javvin, Website, 〈http://www. javvin.com/networksecurity/IPS.html〉; 2011.
-
(2011)
IPS: Intrusion Prevention System
-
-
|