메뉴 건너뛰기




Volumn 6592 LNAI, Issue PART 2, 2011, Pages 353-362

Self-similarity based lightweight intrusion detection method for cloud computing

Author keywords

Anomaly detection; Cloud computing; Information security; Intrusion detection; Lightweight; Self similarity

Indexed keywords

ANOMALY DETECTION; ANOMALY DETECTION METHODS; CLOUD SYSTEMS; COMPUTING SERVICES; COSINE SIMILARITY; DATA LEAKAGE; HIGH PERFORMANCE COMPUTING; INTERNAL ACTIVITY; INTRUSION DETECTION METHOD; INTRUSION DETECTION SYSTEMS; KEY SUCCESS FACTORS; LEARNING PROCESS; LIGHTWEIGHT; OPTIMAL TIME; SELF-SIMILARITIES; SYSTEM CALLS; SYSTEM PERFORMANCE DEGRADATION;

EID: 84872111291     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-20042-7_36     Document Type: Conference Paper
Times cited : (40)

References (13)
  • 3
    • 34548613852 scopus 로고    scopus 로고
    • Network intrusion detection using wavelet analysis
    • Das, G., Gulati, V.P. (eds.), CIT 2004, Springer, Heidelberg
    • Rawat, S., Sastry, C.S.: Network Intrusion Detection Using Wavelet Analysis. In: Das, G., Gulati, V.P. (eds.) CIT 2004. LNCS, vol. 3356, pp. 224-232. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3356 , pp. 224-232
    • Rawat, S.1    Sastry, C.S.2
  • 4
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: Evidence and possible causes
    • Crovella, M.E., Bestavros, A.: Self-similarity in World Wide Web traffic: Evidence and possible causes. IEEE/ACM Transactions on networking 5(6), 835-845 (1997)
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 835-845
    • Crovella, M.E.1    Bestavros, A.2
  • 5
    • 0031078972 scopus 로고    scopus 로고
    • Self-similarity through highvariability; Statistical analysis of Ethernet LAN traffic at the source level
    • Willinger, W., Taqqu, M.S., Sherman, R., Wilson, D.V.: Self-similarity through highvariability; statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking 5(1), 71-86 (1997)
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.1 , pp. 71-86
    • Willinger, W.1    Taqqu, M.S.2    Sherman, R.3    Wilson, D.V.4
  • 6
    • 0035246057 scopus 로고    scopus 로고
    • Online error detection through observation of traffic selfsimilarity
    • Schleifer, W., Mannle, M.: Online error detection through observation of traffic selfsimilarity. Proceedings of IEEE Communications 148(1), 38-42 (2001)
    • (2001) Proceedings of IEEE Communications , vol.148 , Issue.1 , pp. 38-42
    • Schleifer, W.1    Mannle, M.2
  • 7
    • 84943421730 scopus 로고    scopus 로고
    • On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
    • Allen, W.H., Marin, G.A.: On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems. In: Proceedings Symposium on Applications and the Internet, pp. 242-248 (2003)
    • (2003) Proceedings Symposium on Applications and the Internet , pp. 242-248
    • Allen, W.H.1    Marin, G.A.2
  • 8
    • 84964555718 scopus 로고    scopus 로고
    • Decision analysis of network based intrusion detection systems for denial-of-service attacks
    • Li, M., Jia, W., Zhao, W.: Decision analysis of network based intrusion detection systems for denial-of-service attacks. In: Proceedings Conferences on ICII, vol. 5, pp. 1-6 (2001)
    • (2001) Proceedings Conferences on ICII , vol.5 , pp. 1-6
    • Li, M.1    Jia, W.2    Zhao, W.3
  • 9
    • 0035402121 scopus 로고    scopus 로고
    • Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems
    • Nash, D.A., Ragsdale, D.: Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. IEEE Transactions on Systems, Man and Cybernetics 31(4), 327-331 (2001)
    • (2001) IEEE Transactions on Systems, Man and Cybernetics , vol.31 , Issue.4 , pp. 327-331
    • Nash, D.A.1    Ragsdale, D.2
  • 11
    • 84860141870 scopus 로고    scopus 로고
    • August 29
    • Microsoft Technet, Security Monitoring and Attack Detection (August 29, 2006), http://technet.microsoft.com/en-us/library/cc875806.aspx
    • (2006) Security Monitoring and Attack Detection


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.