메뉴 건너뛰기




Volumn 1, Issue 1, 2012, Pages 1-19

An agent based business aware incident detection system for cloud environments

Author keywords

Agents; Cloud audit; Cloud security

Indexed keywords

AGENTS; ARCHITECTURE; AUTONOMOUS AGENTS; HIGH LEVEL LANGUAGES; INTRUSION DETECTION;

EID: 84926426274     PISSN: None     EISSN: 2192113X     Source Type: Journal    
DOI: 10.1186/2192-113X-1-9     Document Type: Article
Times cited : (48)

References (86)
  • 3
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: a survey on IaaS cloud security
    • Vaquero L, Rodero-Merino L, Moran D: Locking the sky: a survey on IaaS cloud security. Computing 2011, 91: 93-118.
    • (2011) Computing , vol.91 , pp. 93-118
    • Vaquero, L.1    Rodero-Merino, L.2    Moran, D.3
  • 8
    • 84926428159 scopus 로고    scopus 로고
    • Amazon Service Health Dashboard 2011
    • Amazon Service Health Dashboard 2011.
  • 10
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • Recent Advances in Intrusion Detection Systems
    • Spafford EH, Zamboni D: Intrusion detection using autonomous agents. Comput Networks 2000, 34(4): 547-570. Recent Advances in Intrusion Detection Systems.
    • (2000) Comput Networks , vol.34 , Issue.4 , pp. 547-570
    • Spafford, E.H.1    Zamboni, D.2
  • 11
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    • Lou W
    • Wang C, Wang Q: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In INFOCOM, 2010 Proceedings IEEE. Lou W; 2010: 1-9.
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-9
    • Wang, C.1    Wang, Q.2
  • 13
    • 83455220824 scopus 로고    scopus 로고
    • A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures. In Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW)
    • Massonet P, Naqvi S, Ponsard C, Latanicki J, Rochwerger B, Villari M: A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures. In Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW). 2011 IEEE International Symposium on 2011, 1510-1517.
    • (2011) 2011 IEEE International Symposium on , pp. 1510-1517
    • Massonet, P.1    Naqvi, S.2    Ponsard, C.3    Latanicki, J.4    Rochwerger, B.5    Villari, M.6
  • 21
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • Garcia-Teodoro P, Daaz-Verdejo J, Macia-Fernandez G, Vazquez E: Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput Security 2009, 28(1-2): 18-28. [http://linkinghub. elsevier. com/retrieve/pii/S0167404808000692].
    • (2009) Comput Security , vol.28 , Issue.1-2 , pp. 18-28
    • Garcia-Teodoro, P.1    Daaz-Verdejo, J.2    Macia-Fernandez, G.3    Vazquez, E.4
  • 22
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Patcha A, Park JM: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput Networks 2007, 51(12): 3448-3470. [http://linkinghub. elsevier. com/retrieve/pii/S138912860700062X].
    • (2007) Comput Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 24
    • 77954931494 scopus 로고    scopus 로고
    • Intrusion Detection for Grid and Cloud Computing
    • Vieira K, Schulter A, Westphall CB, Westphall CM: Intrusion Detection for Grid and Cloud Computing. It Professional 2010, 12(4): 38-43. [http://ieeexplore. ieee. org/lpdocs/epic03/wrapper. htm?arnumber=5232794].
    • (2010) It Professional , vol.12 , Issue.4 , pp. 38-43
    • Vieira, K.1    Schulter, A.2    Westphall, C.B.3    Westphall, C.M.4
  • 27
    • 84857146691 scopus 로고    scopus 로고
    • Securing Virtualized Infrastructure: From Static Security to Virtual Shields
    • Antonopoulos A
    • Antonopoulos A: Securing Virtualized Infrastructure: From Static Security to Virtual Shields. Tech. rep., Nemertes Research 2007. [http://hackreport. net/wp-content/uploads/2007/03/nemertes-issue-paper-securing-virtualized-infrastructure. pdf].
    • (2007) Tech. Rep., Nemertes Research
  • 32
    • 0038391162 scopus 로고    scopus 로고
    • Agent based intrusion detection and response system for wireless LANs
    • Chirumamilla M, Ramamurthy B: Agent based intrusion detection and response system for wireless LANs. Communications, 2003. ICC '03 2003, 492-496.
    • (2003) Communications, 2003. ICC '03 , pp. 492-496
    • Chirumamilla, M.1    Ramamurthy, B.2
  • 43
    • 84926427047 scopus 로고    scopus 로고
    • Systemautomatisierung
    • [10.1007/978-3-540-46165-4_9], Berlin: Heidelberg
    • Schneider J: Systemautomatisierung. In Kircher H(ed) IT,. Berlin Heidelberg; 2007: pp 110-123. [10. 1007/978-3-540-46165-4_9]. [http://dx. doi. org/10. 1007/978-3-540-46165-4_9].
    • (2007) Kircher H(Ed) IT , pp. 110-123
    • Schneider, J.1
  • 48
    • 84926428155 scopus 로고    scopus 로고
    • Cloudburst
    • Kortchinsky K: Cloudburst. Black Hat USA 2009. [http://www. blackhat. com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky-Cloudburst-PAPER. pdf].
    • (2009) Black Hat USA
    • Kortchinsky, K.1
  • 49
    • 84881139601 scopus 로고    scopus 로고
    • Virtunoid: A KVM Guest → Host privilege, escalation exploit
    • Elhage N: Virtunoid: A KVM Guest → Host privilege, escalation exploit. Black Hat USA 2011. [http://media. blackhat. com/bh-us-11/Elhage/BH_US_11_Elhage_Virtunoid_WP. pdf].
    • (2011) Black Hat USA
    • Elhage, N.1
  • 50
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion Detection using Sequences of System Calls
    • Hofmeyr SA, Forrest S, Somayaji A: Intrusion Detection using Sequences of System Calls. J Comput Security 1998, 6: 151-180.
    • (1998) J Comput Security , vol.6 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 55
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • Garcia-Teodoro P, Daaz-Verdejo J, Macia-Fernandez G, Vazquez E: Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput Security 2009, 28(1-2): 18-28. [http://linkinghub. elsevier. com/retrieve/pii/S0167404808000692].
    • (2009) Comput Security , vol.28 , Issue.1-2 , pp. 18-28
    • Garcia-Teodoro, P.1    Daaz-Verdejo, J.2    Macia-Fernandez, G.3    Vazquez, E.4
  • 56
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Patcha A, Park JM: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput Networks 2007, 51(12): 3448-3470. [http://linkinghub. elsevier. com/retrieve/pii/S138912860700062X].
    • (2007) Comput Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 58
    • 77954931494 scopus 로고    scopus 로고
    • Intrusion Detection for Grid and Cloud Computing
    • Vieira K, Schulter A, Westphall CB, Westphall CM: Intrusion Detection for Grid and Cloud Computing. It Professional 2010, 12(4): 38-43. [http://ieeexplore. ieee. org/lpdocs/epic03/wrapper. htm?arnumber=5232794].
    • (2010) It Professional , vol.12 , Issue.4 , pp. 38-43
    • Vieira, K.1    Schulter, A.2    Westphall, C.B.3    Westphall, C.M.4
  • 61
    • 84857146691 scopus 로고    scopus 로고
    • Securing Virtualized Infrastructure: From Static Security to Virtual Shields
    • Antonopoulos A
    • Antonopoulos A: Securing Virtualized Infrastructure: From Static Security to Virtual Shields. Tech. rep., Nemertes Research 2007. [http://hackreport. net/wp-content/uploads/2007/03/nemertes-issue-paper-securing-virtualized-infrastructure. pdf].
    • (2007) Tech. Rep., Nemertes Research
  • 66
    • 0038391162 scopus 로고    scopus 로고
    • Agent based intrusion detection and response system for wireless LANs
    • Chirumamilla M, Ramamurthy B: Agent based intrusion detection and response system for wireless LANs. Communications, 2003. ICC '03 2003, 492-496.
    • (2003) Communications, 2003. ICC '03 , pp. 492-496
    • Chirumamilla, M.1    Ramamurthy, B.2
  • 77
    • 84926427047 scopus 로고    scopus 로고
    • Systemautomatisierung
    • [10.1007/978-3-540-46165-4_9], Berlin: Heidelberg
    • Schneider J: Systemautomatisierung. In Kircher H(ed) IT,. Berlin Heidelberg; 2007: pp 110-123. [10. 1007/978-3-540-46165-4_9]. [http://dx. doi. org/10. 1007/978-3-540-46165-4_9].
    • (2007) Kircher H(Ed) IT, , pp. 110-123
    • Schneider, J.1
  • 82
    • 84926428155 scopus 로고    scopus 로고
    • Cloudburst
    • Kortchinsky K: Cloudburst. Black Hat USA 2009. [http://www. blackhat. com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky-Cloudburst-PAPER. pdf].
    • (2009) Black Hat USA
    • Kortchinsky, K.1
  • 83
    • 84881139601 scopus 로고    scopus 로고
    • Virtunoid: A KVM Guest → Host privilege, escalation exploit
    • Elhage N: Virtunoid: A KVM Guest → Host privilege, escalation exploit. Black Hat USA 2011. [http://media. blackhat. com/bh-us-11/Elhage/BH_US_11_Elhage_Virtunoid_WP. pdf].
    • (2011) Black Hat USA
    • Elhage, N.1
  • 84
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion Detection using Sequences of System Calls
    • Hofmeyr SA, Forrest S, Somayaji A: Intrusion Detection using Sequences of System Calls. J Comput Security 1998, 6: 151-180.
    • (1998) J Comput Security , vol.6 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.