메뉴 건너뛰기




Volumn 2, Issue , 2013, Pages 177-181

Behavioral modeling for suspicious process detection in cloud computing environments

Author keywords

Behavioral Modeling; Cloud Computing Security; Multi Tenancy; Suspicious Process Detection

Indexed keywords

BEHAVIORAL MODEL; CLOUD COMPUTING SECURITIES; EFFECTIVENESS AND EFFICIENCIES; EFFICIENT RESOURCE ALLOCATION; INTRUSION DETECTION TECHNOLOGIES; MULTI TENANCIES; ON-DEMAND RESOURCE PROVISIONING; PROCESS DETECTION;

EID: 84883514167     PISSN: 15516245     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MDM.2013.90     Document Type: Conference Paper
Times cited : (9)

References (19)
  • 8
    • 77952255373 scopus 로고    scopus 로고
    • Beyond the CPU: Defeating hardware based ram acquisition tools
    • February
    • J. Rutkowska, "Beyond the CPU: Defeating Hardware Based RAM Acquisition Tools," Blackhat, February 2007.
    • (2007) Blackhat
    • Rutkowska, J.1
  • 9
    • 80755169480 scopus 로고    scopus 로고
    • Eliminating the hypervisor attack surface for a more secure cloud
    • J. Szefer, E. Keller, R.B. Lee, and J. Rexford, "Eliminating the hypervisor attack surface for a more secure cloud," ACM CCS, 2011.
    • (2011) ACM CCS
    • Szefer, J.1    Keller, E.2    Lee, R.B.3    Rexford, J.4
  • 10
    • 84869441988 scopus 로고    scopus 로고
    • Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense)
    • V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M.M. Swift, "Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)," ACM CCS, 2012.
    • (2012) ACM CCS
    • Varadarajan, V.1    Kooburat, T.2    Farley, B.3    Ristenpart, T.4    Swift, M.M.5
  • 13
    • 84869859962 scopus 로고    scopus 로고
    • Cross-VM side channels and their use to extract private keys
    • Y. Zhang, A. Juels, M.K. Reiter, and T. Ristenpart, "Cross-VM side channels and their use to extract private keys," ACM CCS, 2012.
    • (2012) ACM CCS
    • Zhang, Y.1    Juels, A.2    Reiter, M.K.3    Ristenpart, T.4
  • 14
    • 84962558350 scopus 로고    scopus 로고
    • Metasploitable, http://sourceforge.net/projects/metasploitable/.
    • Metasploitable
  • 15
    • 84883509832 scopus 로고    scopus 로고
    • Metasploit, http://www.metasploit.com/.
    • Metasploit
  • 16
    • 84883504157 scopus 로고    scopus 로고
    • Backtrack-Linux, http://www.backtrack-linux.org/.
    • Backtrack-Linux
  • 17
    • 84883541885 scopus 로고    scopus 로고
    • Gephi Available
    • Gephi, Available: https://gephi.org.
  • 18
    • 84883496622 scopus 로고    scopus 로고
    • Open Mobile Terminal Platform Alliance
    • Open Mobile Terminal Platform Alliance, "OMTP Approved Deliverables," 2010, http://www.omtp.org/approved.html.
    • (2010) OMTP Approved Deliverables


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.