메뉴 건너뛰기




Volumn , Issue , 2013, Pages 260-267

Auditing and analysis of network traffic in cloud environment

Author keywords

cloud auditing; IP geolocation; online data mining

Indexed keywords

CLOUD COMPUTING ENVIRONMENTS; CLOUD ENVIRONMENTS; CONFIGURABLE COMPUTING; IP GEOLOCATION; NETWORK TRAFFIC ANALYSIS; ON-DEMAND APPLICATIONS; ONLINE DATA; SECURITY AND PERFORMANCE;

EID: 84888031754     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SERVICES.2013.42     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 1
    • 77954695824 scopus 로고    scopus 로고
    • Cloud Security Alliance
    • Cloud Security Alliance, Top Threats to Cloud Computing. www.cloudsecurityalliance.org/topthreats/csathreats.v1. 0.pdf, 2010.
    • (2010) Top Threats to Cloud Computing
  • 2
    • 84888036896 scopus 로고    scopus 로고
    • Google cloud platform used for botnet control. 2012
    • Google cloud platform used for botnet control. http://www.infosecurity- us.com/view/5115/ google-cloud-platform-used-for-botnet-control, 2012.
  • 3
    • 84888029626 scopus 로고    scopus 로고
    • Maxmind., 2012
    • Maxmind. http://www.maxmind.com, 2012.
  • 4
    • 84888025074 scopus 로고    scopus 로고
    • PlanetLab., 2012
    • PlanetLab. http://www.planet-lab.org, 2012.
  • 10
    • 70449625632 scopus 로고    scopus 로고
    • Combining incremental hidden markov model and adaboost algorithm for anomaly intrusion detection
    • Y. Chen Chen. Combining incremental hidden markov model and adaboost algorithm for anomaly intrusion detection. 2009. KDD Workshop on CyberSecurity and Intelligence Informatics.
    • (2009) KDD Workshop on CyberSecurity and Intelligence Informatics
    • Chen Chen, Y.1
  • 11
    • 79960865930 scopus 로고    scopus 로고
    • A learning-based approach for ip geolocation
    • Brian Eriksson, Paul Barford, Joel Sommers, and Robert Nowak. A learning-based approach for ip geolocation. In PAM, 2010.
    • (2010) PAM
    • Eriksson, B.1    Barford, P.2    Sommers, J.3    Nowak, R.4
  • 12
    • 12244286335 scopus 로고    scopus 로고
    • Systematic data selection to mine concept-drifting data streams
    • Fan. Systematic data selection to mine concept-drifting data streams. 2004. ACM SIGKDD.
    • (2004) ACM SIGKDD
  • 13
    • 0041657519 scopus 로고    scopus 로고
    • Interior point methods for massive support vector machines
    • T. Munson Ferris. Interior point methods for massive support vector machines. 2003. SIAM J. Optim.
    • (2003) SIAM J. Optim
    • Munson Ferris, T.1
  • 16
    • 12244300520 scopus 로고    scopus 로고
    • Eigenspace-based anomaly detection in computer systems
    • IDE and H. Kashima. Eigenspace-based anomaly detection in computer systems. 2004. ACM SIGKDD.
    • (2004) ACM SIGKDD
    • Ide1    Kashima, H.2
  • 17
    • 61749085938 scopus 로고    scopus 로고
    • Comparing anomaly detection techniques for http
    • L. Ingham and H. Inoue. Comparing anomaly detection techniques for http. 2007. RAID.
    • (2007) RAID
    • Ingham, L.1    Inoue, H.2
  • 18
    • 56749157104 scopus 로고    scopus 로고
    • Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks
    • A. Carvalho J. Spinosa and J. Gama. Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks. 2008. ACM symposium on Applied computing.
    • (2008) ACM Symposium on Applied Computing
    • Carvalho, A.1    Spinosa, J.2    Gama, J.3
  • 20
    • 78650154288 scopus 로고    scopus 로고
    • A new form of dos attack in a cloud and its avoidance mechanism
    • Liu. A new form of dos attack in a cloud and its avoidance mechanism. 2010. ACM CCSW.
    • (2010) ACM CCSW
    • Liu1
  • 23
    • 84888073746 scopus 로고    scopus 로고
    • Mining concept drifting network traffic in cloud computing environments
    • S. Mukkavilli and S. Shetty. "mining concept drifting network traffic in cloud computing environments. In CCGRID. ACM/IEEE, 2012.
    • (2012) CCGRID. ACM/IEEE
    • Mukkavilli, S.1    Shetty, S.2
  • 24
    • 84888067067 scopus 로고    scopus 로고
    • Assessing network path vulnerabilities for secure cloud computing
    • Shetty S. Reddy, S. and X. Xiong. Assessing network path vulnerabilities for secure cloud computing. In CCGRID. ACM/IEEE, 2013.
    • (2013) CCGRID. ACM/IEEE
    • Reddy, S.S.S.1    Xiong, X.2
  • 27
    • 84888032271 scopus 로고    scopus 로고
    • Online semi-smooth support vector machine for incremental learning
    • M. Song Shetty, T. Munson. Online semi-smooth support vector machine for incremental learning. 2012. submitted to Journal of Computer Security.
    • (2012) Journal of Computer Security
    • Song Shetty, M.1    Munson, T.2
  • 28
    • 77953302052 scopus 로고    scopus 로고
    • The impact of virtualization on network performance of amazon ec2 data center
    • Wang and T. S. E. Ng. The impact of virtualization on network performance of amazon ec2 data center. pages 1163-1171, 2010. INFOCOM.
    • (2010) INFOCOM , pp. 1163-1171
    • Wang, T.S.1    Ng, E.2
  • 29
    • 0030126609 scopus 로고    scopus 로고
    • Learning in the presence of concept drifting and hidden contexts
    • Widmer and M. Kubat. Learning in the presence of concept drifting and hidden contexts. pages 69-101, 1996. Machine Learning.
    • (1996) Machine Learning , pp. 69-101
    • Widmer, M.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.