메뉴 건너뛰기




Volumn , Issue , 2014, Pages 598-603

Towards a security SLA-based cloud monitoring service

Author keywords

Cloud monitoring; Security monitoring; SLA management

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SCIENCE;

EID: 84902336621     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.5220/0004957305980603     Document Type: Conference Paper
Times cited : (28)

References (34)
  • 2
    • 84874066699 scopus 로고    scopus 로고
    • Qos-monaas: A portable architecture for qos monitoring in the cloud
    • Adinolfi, O., Cristaldi, R., Coppolino, L., and Romano, L. (2012). Qos-monaas: A portable architecture for qos monitoring in the cloud. SITIS '12, pages 527-532.
    • (2012) SITIS '12 , pp. 527-532
    • Adinolfi, O.1    Cristaldi, R.2    Coppolino, L.3    Romano, L.4
  • 5
    • 70349145918 scopus 로고    scopus 로고
    • Decoupling dynamic program analysis from execution in virtual environments
    • Chow, J., Garfinkel, T., and Chen, P.M. (2008). Decoupling dynamic program analysis from execution in virtual environments. ATC '08, pages 1-14.
    • (2008) ATC '08 , pp. 1-14
    • Chow, J.1    Garfinkel, T.2    Chen, P.M.3
  • 6
    • 77953032795 scopus 로고    scopus 로고
    • Sla perspective in security management for cloud computing
    • de Chaves, S., Westphall, C., and Lamin, F. (2010). Sla perspective in security management for cloud computing. ICNS '10, pages 212-217.
    • (2010) ICNS '10 , pp. 212-217
    • De Chaves, S.1    Westphall, C.2    Lamin, F.3
  • 7
    • 84978401615 scopus 로고    scopus 로고
    • Revirt: Enabling intrusion analysis through virtual-machine logging and replay
    • Dunlap, G. W., King, S. T., Cinar, S., Basrai, M. A., and Chen, P. M. (2002). Revirt: Enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev., 36(SI):211-224.
    • (2002) SIGOPS Oper. Syst. Rev. , vol.36 , Issue.1 , pp. 211-224
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.A.4    Chen, P.M.5
  • 8
    • 77956957766 scopus 로고    scopus 로고
    • Low level metrics to high level slas - lom2his framework: Bridging the gap between monitored metrics and sla parameters in cloud environments
    • Emeakaroha, V., Brandic, I., Maurer, M., and Dustdar, S. (2010). Low level metrics to high level slas - lom2his framework: Bridging the gap between monitored metrics and sla parameters in cloud environments. HPCS '10, pages 48-54.
    • (2010) HPCS '10 , pp. 48-54
    • Emeakaroha, V.1    Brandic, I.2    Maurer, M.3    Dustdar, S.4
  • 9
    • 84870849331 scopus 로고    scopus 로고
    • Casvid: Application level monitoring for sla violation detection in clouds
    • Emeakaroha, V., Ferreto, T., Netto, M., Brandic, I., and De Rose, C. (2012). Casvid: Application level monitoring for sla violation detection in clouds. COMPSAC '12, pages 499-508.
    • (2012) COMPSAC '12 , pp. 499-508
    • Emeakaroha, V.1    Ferreto, T.2    Netto, M.3    Brandic, I.4    De Rose, C.5
  • 10
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • Garfinkel, T. and Rosenblum, M. (2003). A virtual machine introspection based architecture for intrusion detection. NDSS'03, pages 191-206.
    • (2003) NDSS'03 , pp. 191-206
    • Garfinkel, T.1    Rosenblum, M.2
  • 12
    • 81055155507 scopus 로고    scopus 로고
    • Cloudsec: A securitymonitoring appliance for virtual machines in the iaas cloud model
    • Ibrahim, A., Hamlyn-Harris, J., Grundy, J., and Almorsy, M. (2011). Cloudsec: A securitymonitoring appliance for virtual machines in the iaas cloud model. NSS '11, pages 113-120.
    • (2011) NSS '11 , pp. 113-120
    • Ibrahim, A.1    Hamlyn-Harris, J.2    Grundy, J.3    Almorsy, M.4
  • 13
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through vmm-based out-of-The-box semantic view reconstruction
    • Jiang, X., Wang, X., and Xu, D. (2007). Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. CCS '07, pages 128- 138.
    • (2007) CCS '07 , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 14
    • 77952336652 scopus 로고    scopus 로고
    • Vmm-based hidden process detection and identification using lycosid
    • Jones, S. T., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. (2008). Vmm-based hidden process detection and identification using lycosid. VEE '08, pages 91- 100.
    • (2008) VEE '08 , pp. 91-100
    • Jones, S.T.1    Arpaci-Dusseau, A.C.2    Arpaci-Dusseau, R.H.3
  • 15
    • 84893543049 scopus 로고    scopus 로고
    • K-tracer: A system for extracting kernel malware behavior
    • Lanzi, A., Sharif, M. I., and Lee, W. (2009). K-tracer: A system for extracting kernel malware behavior. NDSS'09.
    • (2009) NDSS'09
    • Lanzi, A.1    Sharif, M.I.2    Lee, W.3
  • 16
    • 72949120122 scopus 로고    scopus 로고
    • Kvmsec: A security extension for linux kernel virtual machines
    • Lombardi, F. and Di Pietro, R. (2009). Kvmsec: A security extension for linux kernel virtual machines. SAC '09, pages 2029-2034.
    • (2009) SAC '09 , pp. 2029-2034
    • Lombardi, F.1    Di Pietro, R.2
  • 18
    • 77950831023 scopus 로고    scopus 로고
    • Mavmm: Lightweight and purpose built vmm for malware analysis
    • Nguyen, A., Schear, N., Jung, H., Godiyal, A., King, S., and Nguyen, H. (2009). Mavmm: Lightweight and purpose built vmm for malware analysis. ACSAC '09, pages 441-450.
    • (2009) ACSAC '09 , pp. 441-450
    • Nguyen, A.1    Schear, N.2    Jung, H.3    Godiyal, A.4    King, S.5    Nguyen, H.6
  • 20
    • 50249101677 scopus 로고    scopus 로고
    • Lares: An architecture for secure active monitoring using virtualization
    • Payne, B., Carbone, M., Sharif, M., and Lee, W. (2008). Lares: An architecture for secure active monitoring using virtualization. SP '08, pages 233-247.
    • (2008) SP '08 , pp. 233-247
    • Payne, B.1    Carbone, M.2    Sharif, M.3    Lee, W.4
  • 24
    • 56549083677 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
    • Riley, R., Jiang, X., and Xu, D. (2008). Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. RAID '08, pages 1-20.
    • (2008) RAID '08 , pp. 1-20
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 25
    • 70349128844 scopus 로고    scopus 로고
    • Multi-aspect profiling of kernel rootkit behavior
    • Riley, R., Jiang, X., and Xu, D. (2009). Multi-aspect profiling of kernel rootkit behavior. EuroSys '09, pages 47-60.
    • (2009) EuroSys '09 , pp. 47-60
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 26
    • 41149103393 scopus 로고    scopus 로고
    • Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
    • Seshadri, A., Luk, M., Qu, N., and Perrig, A. (2007). Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. SOSP '07, pages 335- 350.
    • (2007) SOSP '07 , pp. 335-350
    • Seshadri, A.1    Luk, M.2    Qu, N.3    Perrig, A.4
  • 27
    • 74049145643 scopus 로고    scopus 로고
    • Secure in-vm monitoring using hardware virtualization
    • Sharif, M. I., Lee, W., Cui, W., and Lanzi, A. (2009). Secure in-vm monitoring using hardware virtualization. CCS '09, pages 477-487.
    • (2009) CCS '09 , pp. 477-487
    • Sharif, M.I.1    Lee, W.2    Cui, W.3    Lanzi, A.4
  • 28
    • 84874562245 scopus 로고    scopus 로고
    • Cloud watcher: Network security monitoring using open flow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
    • Shin, S. and Gu, G. (2012). Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). ICNP '12, pages 1-6.
    • (2012) ICNP '12 , pp. 1-6
    • Shin, S.1    Gu, G.2
  • 29
    • 84885950922 scopus 로고    scopus 로고
    • Distributed, application-level monitoring for heterogeneous clouds using stream processing
    • Smit, M., Simmons, B., and Litoiu, M. (2013). Distributed, application-level monitoring for heterogeneous clouds using stream processing. Future Generation Computer Systems, 29(8):2103-2114.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.8 , pp. 2103-2114
    • Smit, M.1    Simmons, B.2    Litoiu, M.3
  • 32
    • 84877645675 scopus 로고    scopus 로고
    • Secmon: A secure introspection framework for hardware virtualization
    • Wu, X., Gao, Y., Tian, X., Song, Y., Guo, B., Feng, B., and Sun, Y. (2013). Secmon: A secure introspection framework for hardware virtualization. PDP '13, pages 282-286.
    • (2013) PDP '13 , pp. 282-286
    • Wu, X.1    Gao, Y.2    Tian, X.3    Song, Y.4    Guo, B.5    Feng, B.6    Sun, Y.7
  • 33
    • 76649114635 scopus 로고    scopus 로고
    • Toward revealing kernel malware behavior in virtual execution environments
    • Xuan, C., Copeland, J., and Beyah, R. (2009). Toward revealing kernel malware behavior in virtual execution environments. RAID '09, pages 304-325.
    • (2009) RAID '09 , pp. 304-325
    • Xuan, C.1    Copeland, J.2    Beyah, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.