메뉴 건너뛰기




Volumn , Issue , 2014, Pages 173-176

Flow based analysis of Advanced Persistent Threats detecting targeted attacks in cloud computing

Author keywords

Advanced Persistent Threats; Cloud Computing; Cyber Security; Flow Based Analysis; Threat Detection

Indexed keywords

CLOUD COMPUTING; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; COST EFFECTIVENESS; INTRUSION DETECTION; VIRUSES;

EID: 84921309064     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOMMST.2014.6992342     Document Type: Conference Paper
Times cited : (37)

References (14)
  • 2
    • 84921276596 scopus 로고    scopus 로고
    • FireEye Threat Intelligence
    • FireEye Threat Intelligence, "Advanced Threat Report: 2013," http://www.fireeye.com, FireEye, 2014.
    • (2014) Advanced Threat Report: 2013
  • 3
    • 84921293427 scopus 로고    scopus 로고
    • White Paper
    • McAfee Security, "Combating Advanced Persistent Threats," White Paper, http://www.mcafee.com/us/resources/white-papers/wp-combat-advanced-persist-threats.pdf, 2011.
    • (2011) Combating Advanced Persistent Threats
    • McAfee, S.1
  • 4
    • 84857299149 scopus 로고    scopus 로고
    • Intrusion analysis with deep packet inspection: Increasing efficiency of packet based investigations
    • D. Smallwood and A. Vance, "Intrusion Analysis with Deep Packet Inspection: Increasing Efficiency of Packet Based Investigations," International Conference on Cloud and Service Computing, 2011.
    • (2011) International Conference on Cloud and Service Computing
    • Smallwood, D.1    Vance, A.2
  • 6
    • 84921289675 scopus 로고    scopus 로고
    • U.S.department of commerce, national institute of standards and technology
    • NIST Special Publication 800-39, March
    • U.S. Department of Commerce, National Institute of Standards and Technology, " Managing Information Security Risk," NIST Special Publication 800-39, March 2011.
    • (2011) Managing Information Security Risk
  • 8
    • 84921290302 scopus 로고    scopus 로고
    • The state of advanced persistent threats
    • Ponemon Institute LLC
    • Ponemon Institute LLC, "The State of Advanced Persistent Threats," Ponemon Research Report, December 2013.
    • (2013) Ponemon Research Report, December
  • 10
    • 84921321735 scopus 로고    scopus 로고
    • Early detection of cyber security threats using structured behavior modeling
    • N, Article A.
    • X. Yan and J. Zhang, "Early Detection of Cyber Security Threats using Structured Behavior Modeling," ACM Transactions on Information and System Security, Vol. V, No. N, Article A, 2013.
    • (2013) ACM Transactions on Information and System Security , vol.5
    • Yan, X.1    Zhang, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.