메뉴 건너뛰기




Volumn 10, Issue 4, 2013, Pages 198-211

NICE: Network intrusion detection and countermeasure selection in virtual network systems

Author keywords

Attack graph; Cloud computing; Intrusion detection; Network security; Zombie detection

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); CLOUD COMPUTING; DENIAL-OF-SERVICE ATTACK; GRAPHIC METHODS; INFRASTRUCTURE AS A SERVICE (IAAS); INTRUSION DETECTION; VIRTUAL MACHINE;

EID: 84897585209     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2013.8     Document Type: Article
Times cited : (276)

References (33)
  • 1
    • 79952065844 scopus 로고    scopus 로고
    • Mar
    • Coud Sercurity Alliance, "Top Threats to Cloud Computing v1.0," https://cloudsecurityalliance.org/topthreats/csathreats. v1.0.pdf, Mar. 2010.
    • (2010) Top Threats to Cloud Computing v1.0
  • 4
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Dec
    • H. Takabi, J.B. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security and Privacy, vol. 8, no. 6, pp. 24-31, Dec. 2010.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.2    Ahn, G.3
  • 5
  • 14
    • 33747198726 scopus 로고    scopus 로고
    • Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
    • DOI 10.1016/j.comcom.2006.04.001, PII S014036640600137X
    • L. Wang, A. Liu, and S. Jajodia, "Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts," Computer Comm., vol. 29, no. 15, pp. 2917-2933, Sept. 2006. (Pubitemid 44232972)
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2917-2933
    • Wang, L.1    Liu, A.2    Jajodia, S.3
  • 17
    • 81455142742 scopus 로고    scopus 로고
    • Dynamic security risk management using bayesian attack graphs
    • Feb
    • N. Poolsappasit, R. Dewri, and I. Ray, "Dynamic Security Risk Management Using Bayesian Attack Graphs," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 1, pp. 61-74, Feb. 2012.
    • (2012) IEEE Trans. Dependable and Secure Computing , vol.9 , Issue.1 , pp. 61-74
    • Poolsappasit, N.1    Dewri, R.2    Ray, I.3
  • 19
    • 84944719521 scopus 로고    scopus 로고
    • "Openflow," http://www.openflow.org/wp/learnmore/, 2012.
    • (2012) Openflow
  • 31
    • 84883718687 scopus 로고    scopus 로고
    • "Metasploit," http://www.metasploit.com, 2012.
    • (2012) Metasploit
  • 32
    • 84980396180 scopus 로고    scopus 로고
    • "Armitage," http://www.fastandeasyhacking.com, 2012.
    • (2012) Armitage


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.