메뉴 건너뛰기




Volumn 9, Issue 16, 2016, Pages 3049-3058

Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

Author keywords

heterogeneous 5G; intrusion detection; mobile cloud computing; security

Indexed keywords

5G MOBILE COMMUNICATION SYSTEMS; COPYRIGHTS; INTRUSION DETECTION; NETWORK SECURITY; WEB SERVICES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84923009701     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1224     Document Type: Article
Times cited : (111)

References (87)
  • 3
    • 84954337494 scopus 로고    scopus 로고
    • Exploring the convergence of mobile computing with cloud computing
    • Ahujia SP, Rolli AC. Exploring the convergence of mobile computing with cloud computing. Network and Communication Technologies 2012; 1(1): 97–102.
    • (2012) Network and Communication Technologies , vol.1 , Issue.1 , pp. 97-102
    • Ahujia, S.P.1    Rolli, A.C.2
  • 4
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: can offloading computation save energy?
    • Kumar K, Lu Y. Cloud computing for mobile users: can offloading computation save energy?Computer 2010; 43(4): 51–56.
    • (2010) Computer , vol.43 , Issue.4 , pp. 51-56
    • Kumar, K.1    Lu, Y.2
  • 5
    • 84881318165 scopus 로고    scopus 로고
    • A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing
    • Shiraz M, Gani A, Khokhar RH, Buyya R. A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials 2013; 15(3): 1294–1313.
    • (2013) IEEE Communications Surveys & Tutorials , vol.15 , Issue.3 , pp. 1294-1313
    • Shiraz, M.1    Gani, A.2    Khokhar, R.H.3    Buyya, R.4
  • 8
    • 84860849234 scopus 로고    scopus 로고
    • Balance of security strength and energy for a PMU monitoring system in smart grid
    • Qiu M, Su H, Chen M, Ming Z, Yang LT. Balance of security strength and energy for a PMU monitoring system in smart grid. IEEE Communications Magazine 50 2012; (5): 142–149.
    • (2012) IEEE Communications Magazine , vol.50 , Issue.5 , pp. 142-149
    • Qiu, M.1    Su, H.2    Chen, M.3    Ming, Z.4    Yang, L.T.5
  • 9
    • 82155167643 scopus 로고    scopus 로고
    • Energy efficient security algorithm for power grid wide area monitoring system
    • Qiu M, Gao W, Chen M, Niu J, Zhang L. Energy efficient security algorithm for power grid wide area monitoring system. IEEE Transactions on Smart Grid 2011; 2(4): 715–723.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.4 , pp. 715-723
    • Qiu, M.1    Gao, W.2    Chen, M.3    Niu, J.4    Zhang, L.5
  • 24
    • 84896464174 scopus 로고    scopus 로고
    • High-performance mobile internet
    • Mahanti A, Sen S. High-performance mobile internet. IEEE Internet Computing 2014; 18(1): 8–11.
    • (2014) IEEE Internet Computing , vol.18 , Issue.1 , pp. 8-11
    • Mahanti, A.1    Sen, S.2
  • 27
    • 84861610314 scopus 로고    scopus 로고
    • P2P-MapReduce: parallel data processing in dynamic cloud environments
    • Marozzo F, Talia D, Trunfio P. P2P-MapReduce: parallel data processing in dynamic cloud environments. Journal of Computer and System Sciences 2012; 78(5): 1382–1402.
    • (2012) Journal of Computer and System Sciences , vol.78 , Issue.5 , pp. 1382-1402
    • Marozzo, F.1    Talia, D.2    Trunfio, P.3
  • 29
    • 84860750873 scopus 로고    scopus 로고
    • Key technologies of distributed storage for cloud computing
    • Wang Y, Sun W, Zhou S, Pei X, Li X. Key technologies of distributed storage for cloud computing. Journal of Software 2012; 23(4): 232–242.
    • (2012) Journal of Software , vol.23 , Issue.4 , pp. 232-242
    • Wang, Y.1    Sun, W.2    Zhou, S.3    Pei, X.4    Li, X.5
  • 30
    • 84879569469 scopus 로고    scopus 로고
    • Research on key technologies of cloud computing
    • In, Elsevier, Beijing, China
    • Zhang S, Yan H, Chen X, Research on key technologies of cloud computing. In Physics Procedia. Elsevier: Beijing, China, 2012; 1791–1797.
    • (2012) Physics Procedia , pp. 1791-1797
    • Zhang, S.1    Yan, H.2    Chen, X.3
  • 32
    • 84928130094 scopus 로고    scopus 로고
    • DVM: a big virtual machine for cloud computing
    • Ma Z, Sheng Z, Gu L. DVM: a big virtual machine for cloud computing. IEEE Transactions on Computers 2013; 63(9): 2245–2258.
    • (2013) IEEE Transactions on Computers , vol.63 , Issue.9 , pp. 2245-2258
    • Ma, Z.1    Sheng, Z.2    Gu, L.3
  • 33
    • 77957712339 scopus 로고    scopus 로고
    • Network I/O virtualization for cloud computing
    • Luo Y. Network I/O virtualization for cloud computing. IT Professional Magazine 2010; 12(5): 36–41.
    • (2010) IT Professional Magazine , vol.12 , Issue.5 , pp. 36-41
    • Luo, Y.1
  • 34
    • 84992745549 scopus 로고    scopus 로고
    • Reverse host allocation approach for virtual machine cloud computing environment
    • Chaudhary D, Chhillar RS. Reverse host allocation approach for virtual machine cloud computing environment. International Journal of Computer Applications 2013; 72(17): 45–49.
    • (2013) International Journal of Computer Applications , vol.72 , Issue.17 , pp. 45-49
    • Chaudhary, D.1    Chhillar, R.S.2
  • 35
    • 84855579770 scopus 로고    scopus 로고
    • Virtual machine performance benchmarking
    • Langer SG, French T. Virtual machine performance benchmarking. Journal of Digital Imaging 2011; 24(5): 883–889.
    • (2011) Journal of Digital Imaging , vol.24 , Issue.5 , pp. 883-889
    • Langer, S.G.1    French, T.2
  • 36
    • 84992738854 scopus 로고    scopus 로고
    • Energy efficient virtual machine monitoring architecture for green cloud computing
    • Bright PP, Bijolin EE. Energy efficient virtual machine monitoring architecture for green cloud computing. International Journal of Computer Applications 2013; 65(3): 15–18.
    • (2013) International Journal of Computer Applications , vol.65 , Issue.3 , pp. 15-18
    • Bright, P.P.1    Bijolin, E.E.2
  • 37
    • 84881021877 scopus 로고    scopus 로고
    • Performance tradeoffs of energy-aware virtual machine consolidation
    • Lovsz G, Niedermeier F, Meer HD. Performance tradeoffs of energy-aware virtual machine consolidation. Cluster Computing 2013; 16(3): 481–496.
    • (2013) Cluster Computing , vol.16 , Issue.3 , pp. 481-496
    • Lovsz, G.1    Niedermeier, F.2    Meer, H.D.3
  • 38
    • 84885310053 scopus 로고    scopus 로고
    • Security-preserving live migration of virtual machine in the cloud
    • Zhang F, Chen H. Security-preserving live migration of virtual machine in the cloud. Journal of Network and Systems Management 2013; 21:562–587.
    • (2013) Journal of Network and Systems Management , vol.21 , pp. 562-587
    • Zhang, F.1    Chen, H.2
  • 39
  • 48
    • 84902162108 scopus 로고    scopus 로고
    • Parallel programming paradigms and frameworks in big data era
    • Dobre C, Xhafa F. Parallel programming paradigms and frameworks in big data era. International Journal of Parallel Programming 2014; 42(5): 710–738.
    • (2014) International Journal of Parallel Programming , vol.42 , Issue.5 , pp. 710-738
    • Dobre, C.1    Xhafa, F.2
  • 50
    • 79851502837 scopus 로고    scopus 로고
    • Proceedings of 2010 IEEE International Conference on Communication Systems,, Singapore
    • Lei W, Hai W, Yu Y, Fei Z. Heterogeneous network in LTE-advanced system. Proceedings of 2010 IEEE International Conference on Communication Systems, Singapore; 2010; 156–160.
    • (2010) Heterogeneous network in LTE-advanced system , pp. 156-160
    • Lei, W.1    Hai, W.2    Yu, Y.3    Fei, Z.4
  • 51
    • 84906785344 scopus 로고    scopus 로고
    • Managing performance and power consumption tradeoff for multiple heterogeneous servers in cloud computing
    • Tian Y, Lin C, Li K. Managing performance and power consumption tradeoff for multiple heterogeneous servers in cloud computing. Cluster Computing 2014; 17:943–955.
    • (2014) Cluster Computing , vol.17 , pp. 943-955
    • Tian, Y.1    Lin, C.2    Li, K.3
  • 52
    • 79960906259 scopus 로고    scopus 로고
    • 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology,, Chennai
    • Barbu OE, Fratu O. Anenabler of interoperability in heterogeneous wireless networks. 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Chennai; 2011; 1–5.
    • (2011) Anenabler of interoperability in heterogeneous wireless networks , pp. 1-5
    • Barbu, O.E.1    Fratu, O.2
  • 56
    • 84866355973 scopus 로고    scopus 로고
    • Automatic network intrusion detection: current techniques and open issues
    • Catania CA, Garino CG. Automatic network intrusion detection: current techniques and open issues. Computers and Electrical Engineering 2012; 38:1062–1072.
    • (2012) Computers and Electrical Engineering , vol.38 , pp. 1062-1072
    • Catania, C.A.1    Garino, C.G.2
  • 58
    • 84890079004 scopus 로고    scopus 로고
    • Proceedings of the sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks,, Oak Ridge National Laboratory, TN, USA
    • Stamouli I, Argyroudis PG, Tewari H. Real-time intrusion detection for ad hoc networks. Proceedings of the sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Oak Ridge National Laboratory, TN, USA, 2005; 374–380.
    • (2005) Real-time intrusion detection for ad hoc networks , pp. 374-380
    • Stamouli, I.1    Argyroudis, P.G.2    Tewari, H.3
  • 59
    • 84992747805 scopus 로고    scopus 로고
    • Automated signature creator for a signature based intrusion detection system with network attack detection capabilities
    • Ocampo F, Castillo T, Gomez M. Automated signature creator for a signature based intrusion detection system with network attack detection capabilities. International Journal of Cyber-Security and Digital Forensics 2013; 2:25–35.
    • (2013) International Journal of Cyber-Security and Digital Forensics , vol.2 , pp. 25-35
    • Ocampo, F.1    Castillo, T.2    Gomez, M.3
  • 62
    • 84901240193 scopus 로고    scopus 로고
    • EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
    • Meng W, Li W, Kwok L. EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Computers & Security 2014; 43:189–204.
    • (2014) Computers & Security , vol.43 , pp. 189-204
    • Meng, W.1    Li, W.2    Kwok, L.3
  • 63
    • 84901240193 scopus 로고    scopus 로고
    • EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
    • Meng W, Li W, Kwok L. EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Computers & Security 2014; 43189–204.
    • (2014) Computers & Security , vol.43 , pp. 189-204
    • Meng, W.1    Li, W.2    Kwok, L.3
  • 67
    • 84880119198 scopus 로고    scopus 로고
    • A comprehensive survey on anomaly-based intrusion detection in MANET
    • Kheyri D, Karami M. A comprehensive survey on anomaly-based intrusion detection in MANET. Computer and Information Science 2012; 5(4): 132–139.
    • (2012) Computer and Information Science , vol.5 , Issue.4 , pp. 132-139
    • Kheyri, D.1    Karami, M.2
  • 68
    • 84863721194 scopus 로고    scopus 로고
    • Statistical and signal based network traffic recognition for anomaly detection
    • Chora M, Saganowski L, Renk R, Houbowicz W. Statistical and signal based network traffic recognition for anomaly detection. Expert Systems. 2012; 29(3): 232–245.
    • (2012) Expert Systems , vol.29 , Issue.3 , pp. 232-245
    • Chora, M.1    Saganowski, L.2    Renk, R.3    Houbowicz, W.4
  • 69
    • 84992198818 scopus 로고    scopus 로고
    • Anomaly detection based on machine learning: dimensionality reduction using PCA and classification using SVM
    • George A. Anomaly detection based on machine learning: dimensionality reduction using PCA and classification using SVM. International Journal of Computer Applications 2012; 47(21): 5–8.
    • (2012) International Journal of Computer Applications , vol.47 , Issue.21 , pp. 5-8
    • George, A.1
  • 72
    • 84992755318 scopus 로고    scopus 로고
    • A review of clustering techniques based on machine learning approach in intrusion detection systems
    • Shakhatreh AYI, Bakar KA. A review of clustering techniques based on machine learning approach in intrusion detection systems. International Journal of Computer Science Issues 2011; 8(5): 373–381.
    • (2011) International Journal of Computer Science Issues , vol.8 , Issue.5 , pp. 373-381
    • Shakhatreh, A.Y.I.1    Bakar, K.A.2
  • 73
    • 84992755318 scopus 로고    scopus 로고
    • A review of clustering techniques based on machine learning approach in intrusion detection systems
    • Shakhatreh AYI, Bakar KA. A review of clustering techniques based on machine learning approach in intrusion detection systems. International Journal of Computer Science Issues 2011; 8(5): 373–381.
    • (2011) International Journal of Computer Science Issues , vol.8 , Issue.5 , pp. 373-381
    • Shakhatreh, A.Y.I.1    Bakar, K.A.2
  • 74
    • 74149086366 scopus 로고    scopus 로고
    • On the symbiosis of specification-based and anomaly-based detection
    • Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection. Computer & Security 2010; 29:253–268.
    • (2010) Computer & Security , vol.29 , pp. 253-268
    • Stakhanova, N.1    Basu, S.2    Wong, J.3
  • 75
    • 74149086366 scopus 로고    scopus 로고
    • On the symbiosis of specification-based and anomaly-based detection
    • Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection. Computer & Security 2010; 29:253–268.
    • (2010) Computer & Security , vol.29 , pp. 253-268
    • Stakhanova, N.1    Basu, S.2    Wong, J.3
  • 77
    • 84992691199 scopus 로고    scopus 로고
    • Symantec, November, [Accessed on December 2014]
    • Frederick KK. Network intrusion detection signatures, part five. Symantec, November 2010. http://www.symantec.com/connect/articles/network-intrusion-detection-signatures-part-five [Accessed on December 2014].
    • (2010) Network intrusion detection signatures, part five
    • Frederick, K.K.1
  • 78
    • 42449117164 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Gaithersburg, MD, [Accessed on December 2014]
    • Scarfone K, Mell P. Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology: Gaithersburg, MD, 2007. http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf [Accessed on December 2014].
    • (2007) Guide to Intrusion Detection and Prevention Systems (IDPS)
    • Scarfone, K.1    Mell, P.2
  • 80
    • 84879894593 scopus 로고    scopus 로고
    • Protection of MANETs from a range of attacks using an intrusion detection and prevention system
    • Nadeem A, Howarth M. Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommunication Systems 2013; 52(4): 2047–2058.
    • (2013) Telecommunication Systems , vol.52 , Issue.4 , pp. 2047-2058
    • Nadeem, A.1    Howarth, M.2
  • 81
    • 79955920946 scopus 로고    scopus 로고
    • Cost and benefit analysis of authentication systems
    • Altinkemer K, Tawei W. Cost and benefit analysis of authentication systems. Decision Support System 2011; 51(3): 394–404.
    • (2011) Decision Support System , vol.51 , Issue.3 , pp. 394-404
    • Altinkemer, K.1    Tawei, W.2
  • 87
    • 33645215766 scopus 로고    scopus 로고
    • Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    • Shao Z, Xue C, Zhuge Q, Qiu M, Xiao B, Sha E. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Transactions on Computers 2006; 55(4): 443–453.
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.4 , pp. 443-453
    • Shao, Z.1    Xue, C.2    Zhuge, Q.3    Qiu, M.4    Xiao, B.5    Sha, E.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.