메뉴 건너뛰기




Volumn , Issue , 2013, Pages 113-122

Cloudoscopy: Services discovery and topology mapping

Author keywords

cloud mapping; cloud security; cloud tomography; low rate attacks; socket overloading

Indexed keywords

CLOUD SECURITIES; DENIAL OF SERVICE; EXPERIMENTAL VALIDATIONS; LOW RATES; SENSITIVE INFORMATIONS; SERVICES DISCOVERY; SOCKET OVERLOADING; TOPOLOGY MAPPING;

EID: 84889069721     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517488.2517491     Document Type: Conference Paper
Times cited : (19)

References (50)
  • 15
    • 84873677485 scopus 로고    scopus 로고
    • New approaches to security and availability for cloud data
    • A. Juels and A. Oprea. New approaches to security and availability for cloud data. Communications of the ACM, 56(2):64-73, 2013.
    • (2013) Communications of the ACM , vol.56 , Issue.2 , pp. 64-73
    • Juels, A.1    Oprea, A.2
  • 17
    • 54049158161 scopus 로고    scopus 로고
    • I/O for Virtual Machine Monitors: Security and Performance Issues
    • P. A. Karger and D. R. Safford. I/O for Virtual Machine Monitors: Security and Performance Issues. IEEE Security & Privacy, 6(5):16-23, 2008.
    • (2008) IEEE Security & Privacy , vol.6 , Issue.5 , pp. 16-23
    • Karger, P.A.1    Safford, D.R.2
  • 20
    • 84889046548 scopus 로고    scopus 로고
    • Apparatus and method for interrupt handling in a multi-threaded operating system kernel
    • May 7 US Patent 5,515,538
    • S. R. Kleiman. Apparatus and method for interrupt handling in a multi-threaded operating system kernel, May 7 1996. US Patent 5,515,538.
    • (1996)
    • Kleiman, S.R.1
  • 22
    • 1242287727 scopus 로고    scopus 로고
    • Low-Rate TCP-Targeted Denial of Service Attacks: The Shrew vs. the Mice and Elephants
    • New York, NY, USA, ACM
    • A. Kuzmanovic and E. W. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks: the Shrew vs. the Mice and Elephants. In SIGCOMM, pages 75-86, New York, NY, USA, 2003. ACM.
    • (2003) SIGCOMM , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 25
    • 77953995401 scopus 로고    scopus 로고
    • Evaluating standard-based self-virtualizing devices: A performance study on 10 gbe nics with sr-iov support
    • IEEE
    • J. Liu. Evaluating standard-based self-virtualizing devices: A performance study on 10 gbe nics with sr-iov support. In Parallel & Distributed Processing (IPDPS), 2010 IEEE International Symposium on, pages 1-12. IEEE, 2010.
    • (2010) Parallel & Distributed Processing (IPDPS), 2010 IEEE International Symposium on , pp. 1-12
    • Liu, J.1
  • 27
    • 84864368309 scopus 로고    scopus 로고
    • Improving virtualization security by splitting hypervisor into smaller components
    • Springer
    • W. Pan, Y. Zhang, M. Yu, and J. Jing. Improving virtualization security by splitting hypervisor into smaller components. In Data and Applications Security and Privacy XXVI, pages 298-313. Springer, 2012.
    • (2012) Data and Applications Security and Privacy XXVI , pp. 298-313
    • Pan, W.1    Zhang, Y.2    Yu, M.3    Jing, J.4
  • 34
    • 35648972776 scopus 로고    scopus 로고
    • Performance analysis and comparison of interrupt-handling schemes in gigabit networks
    • K. Salah, K. El-Badawi, and F. Haidari. Performance analysis and comparison of interrupt-handling schemes in gigabit networks. Computer Communications, 30(17):3425-3441, 2007.
    • (2007) Computer Communications , vol.30 , Issue.17 , pp. 3425-3441
    • Salah, K.1    El-Badawi, K.2    Haidari, F.3
  • 39
    • 85054279156 scopus 로고    scopus 로고
    • N. C. A. System. September
    • N. C. A. System. Vulnerability Summary for CVE-2007-4993. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007- 4993, September 2007.
    • (2007) Vulnerability Summary for CVE-2007-4993
  • 40
    • 84888985284 scopus 로고    scopus 로고
    • N. C. A. System. December
    • N. C. A. System. Vulnerability Summary for CVE-2007-5497. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007- 5497, December 2007.
    • (2007) Vulnerability Summary for CVE-2007-5497
  • 41
    • 84888988766 scopus 로고    scopus 로고
    • N. C. A. System. March
    • N. C. A. System. Vulnerability Summary for CVE-2010-2240. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010- 2240, March 2010.
    • (2010) Vulnerability Summary for CVE-2010-2240
  • 43
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks on aes, and countermeasures
    • E. Tromer, D. A. Osvik, and A. Shamir. Efficient cache attacks on aes, and countermeasures. Journal of Cryptology, 23(1):37-71, 2010.
    • (2010) Journal of Cryptology , vol.23 , Issue.1 , pp. 37-71
    • Tromer, E.1    Osvik, D.A.2    Shamir, A.3
  • 47
    • 77952337565 scopus 로고    scopus 로고
    • Estimating the impact of interrupt coalescing delays on steady state tcp throughput
    • Citeseer
    • M. Zec, M. Mikuc, and M. Zagar. Estimating the impact of interrupt coalescing delays on steady state tcp throughput. In Proceedings of the 10th SoftCOM, volume 2002. Citeseer, 2002.
    • (2002) Proceedings of the 10th SoftCOM , vol.2002
    • Zec, M.1    Mikuc, M.2    Zagar, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.