메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1941-1945

A general cloud firewall framework with dynamic resource allocation

Author keywords

Anomaly detection; cloud firewall; resource investment

Indexed keywords

MATHEMATICAL MODELS; RESOURCE ALLOCATION;

EID: 84891350551     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2013.6654807     Document Type: Conference Paper
Times cited : (25)

References (16)
  • 2
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing, " J. Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
    • (2011) J. Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 3
    • 84891353380 scopus 로고    scopus 로고
    • A survey on security issues in cloud computing
    • R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal, "A survey on security issues in cloud computing, " CoRR, vol. abs/1109.5388, 2011.
    • (2011) CoRR , vol.ABS-1109 , pp. 5388
    • Bhadauria, R.1    Chaki, R.2    Chaki, N.3    Sanyal, S.4
  • 4
    • 78649336830 scopus 로고    scopus 로고
    • The geometric efficient matching algorithm for firewalls
    • D. Rovniagin and A. Wool, "The geometric efficient matching algorithm for firewalls, " IEEE Trans. Dependable Sec. Comput., vol. 8, no. 1, pp. 147-159, 2011.
    • (2011) IEEE Trans. Dependable Sec. Comput. , vol.8 , Issue.1 , pp. 147-159
    • Rovniagin, D.1    Wool, A.2
  • 5
    • 84858632756 scopus 로고    scopus 로고
    • Detecting and resolving firewall policy anomalies
    • H. Hu, G.-J. Ahn, and K. Kulkarni, "Detecting and resolving firewall policy anomalies, " IEEE Trans. Dependable Sec. Comput., vol. 9, no. 3, pp. 318-331, 2012.
    • (2012) IEEE Trans. Dependable Sec. Comput. , vol.9 , Issue.3 , pp. 318-331
    • Hu, H.1    Ahn, G.-J.2    Kulkarni, K.3
  • 7
    • 84861634583 scopus 로고    scopus 로고
    • Can we beat legitimate cyber behavior mimicking attacks from botnets?
    • S. Yu, S. Guo, and I. Stojmenovic, "Can we beat legitimate cyber behavior mimicking attacks from botnets?" in Proceedings of the INFOCOM, 2012.
    • (2012) Proceedings of the INFOCOM
    • Yu, S.1    Guo, S.2    Stojmenovic, I.3
  • 8
    • 79960631828 scopus 로고    scopus 로고
    • Mitigating ddos attacks with transparent and intelligent fast-flux swarm network
    • no. July/August
    • R. Lua and K. C. Yow, "Mitigating ddos attacks with transparent and intelligent fast-flux swarm network, " IEEE Network, no. July/August, pp. 28-33, 2011.
    • (2011) IEEE Network , pp. 28-33
    • Lua, R.1    Yow, K.C.2
  • 9
    • 77957788301 scopus 로고    scopus 로고
    • Ddos defense as a network service
    • P. Du and A. Nakao, "Ddos defense as a network service, " in NOMS, 2010, pp. 894-897.
    • (2010) NOMS , pp. 894-897
    • Du, P.1    Nakao, A.2
  • 10
    • 84863520750 scopus 로고    scopus 로고
    • On-demand security architecture for cloud computing
    • no. PrePrints
    • J. Chen, Y. Wang, and X. Wang, "On-demand security architecture for cloud computing, " Computer, vol. 99, no. PrePrints, 2012.
    • (2012) Computer , vol.99
    • Chen, J.1    Wang, Y.2    Wang, X.3
  • 11
    • 84856328279 scopus 로고    scopus 로고
    • Edos-shield - A two-steps mitigation technique against edos attacks in cloud computing
    • M. H. Sqalli, F. Al-Haidari, and K. Salah, "Edos-shield - A two-steps mitigation technique against edos attacks in cloud computing, " in UCC, 2011, pp. 49-56.
    • (2011) UCC , pp. 49-56
    • Sqalli, M.H.1    Al-Haidari, F.2    Salah, K.3
  • 15
    • 84886782636 scopus 로고    scopus 로고
    • CloudWatch, http://aws.amazon.com/cloudwatch/.
    • CloudWatch
  • 16
    • 0004210802 scopus 로고
    • Wiley Interscience, Theory
    • L. Kleinrock, Queueing Systems. Wiley Interscience, 1975, vol. I: Theory.
    • (1975) Queueing Systems , vol.1
    • Kleinrock, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.