메뉴 건너뛰기




Volumn 27, Issue 12, 2015, Pages 2964-2981

An overview of insider attacks in cloud computing

Author keywords

cloud computing; cloud computing security; insider attacks; insider threat; internal attacks

Indexed keywords

CLOUD COMPUTING; COST REDUCTION;

EID: 84937734714     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.3243     Document Type: Review
Times cited : (29)

References (39)
  • 1
    • 84862666499 scopus 로고    scopus 로고
    • Ponemon Institute. (Available from:) [Accessed on 2 August, 2011], April
    • Ponemon Institute. Security of cloud computing providers study. (Available from: http://www.ca.com/~/media/Files/IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf) [Accessed on 2 August, 2011], April 2011.
    • (2011) Security of Cloud Computing Providers Study
  • 7
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz EE,. A framework for understanding and predicting insider attacks. Computers & Security 2002; 21 (6): 526-531.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 10
    • 84937733540 scopus 로고    scopus 로고
    • [Accessed on 22 September 2011], 13, July
    • Chu B,. Just how secure are police databases? (Available from: http://blogs.independent.co.uk/2011/07/13/just-how-secure-are-police-databases) [Accessed on 22 September 2011], 13, July 2011.
    • (2011) Just How Secure Are Police Databases?
    • Chu, B.1
  • 12
    • 84886459471 scopus 로고    scopus 로고
    • [Accessed on 7 October 2011], 24, March
    • Galpin R,. Death muddies greek spy probe. (Available from: http://news.bbc.co.uk/1/hi/world/europe/4838552.stm) [Accessed on 7 October 2011], 24, March 2006.
    • (2006) Death Muddies Greek Spy Probe
    • Galpin, R.1
  • 14
    • 33644904044 scopus 로고    scopus 로고
    • The role of behavioral research and profiling in malicious cyber insider investigations
    • Shaw ED,. The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation 2006; 3 (1): 20-31.
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 20-31
    • Shaw, E.D.1
  • 17
    • 2642515264 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST). [Accessed on 20 October, 2011]
    • National Institute of Standards and Technology (NIST). NIST special publication on intrusion detection systems. (Available from: http://handle.dtic.mil/100.2/ADA393326) [Accessed on 20 October, 2011], 2001.
    • (2001) NIST Special Publication on Intrusion Detection Systems
  • 19
    • 84937730442 scopus 로고    scopus 로고
    • [Accessed on 2 August, 2011], 30, April
    • Taylor J,. Sony hackers 'stole 2 million cards'. (Available from: http://www.independent.co.uk/news/uk/crime/sony-hackers-stole-2-million-cards-2276853.html) [Accessed on 2 August, 2011], 30, April 2011.
    • (2011) Sony Hackers 'Stole 2 Million Cards'
    • Taylor, J.1
  • 20
    • 84937724134 scopus 로고    scopus 로고
    • [Accessed on 2 August], 2011, 3, May
    • Goodin D,. Sony says data for 25 million more customers stolen. (Available from: http://www.theregister.co.uk/2011/05/03/sony-hack-exposes-more-customers) [Accessed on 2 August], 2011, 3, May 2011.
    • (2011) Sony Says Data for 25 Million More Customers Stolen.
    • Goodin, D.1
  • 22
    • 84883310548 scopus 로고    scopus 로고
    • Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, 2006
    • Giani A, Berk VH, Cybenko GV,. Data exfiltration and covert channels. in Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, 2006.
    • Data Exfiltration and Covert Channels
    • Giani, A.1    Berk, V.H.2    Cybenko, G.V.3
  • 23
    • 84874116437 scopus 로고    scopus 로고
    • [Accessed on 29 January 2013], August 2011
    • Cloud security alliance. Security as a service working group. (Available from: https://wiki.cloudsecurityalliance.org/group9-wg/index.php/Main-Page) [Accessed on 29 January 2013], August 2011.
    • Cloud Security Alliance. Security As A Service Working Group
  • 24
    • 84937726425 scopus 로고    scopus 로고
    • SANS Institute. (Available from:) [Accessed on 22 August, 2011], June 2007
    • SANS Institute. Correlating SIM information to detect insider threats. (Available from: http://www.sans.org/reading-room/analysts-program/SIMInfo-June07.pdf) [Accessed on 22 August, 2011], June 2007.
    • Correlating SIM Information to Detect Insider Threats
  • 28
    • 84937739040 scopus 로고    scopus 로고
    • [Accessed on 18 August, 2011], August 2011
    • Simply safes. Decoy safes. (Available from: http://www.simplysafes.co.uk/decoy-safes-c-100-76.html) [Accessed on 18 August, 2011], August 2011.
    • Simply Safes. Decoy Safes
  • 29
    • 84937734931 scopus 로고    scopus 로고
    • [Accessed on 18 August, 2011], 26, February
    • Herald SM,. Fake security guards s̈teal close to 1 millionfrom Sydney bank. (Available from: http://www.smh.com.au/nsw/fake-security-guards-steal-close-to-1-million-from-sydney-bank-20100226-p7i3.html) [Accessed on 18 August, 2011], 26, February 2010.
    • (2010) Fake Security Guards ͆teal Close to 1 Millionfrom Sydney Bank
    • Herald, S.M.1
  • 30
    • 84937725021 scopus 로고    scopus 로고
    • [Accessed on 16 January, 2012], 29, November
    • Moskowitz R,. Hijinks on the high seas. (Available from: http://www.networkcomputing.com/1024/1024colmoskowitz.html) [Accessed on 16 January, 2012], 29, November 1999.
    • (1999) Hijinks on the High Seas
    • Moskowitz, R.1
  • 32
    • 15944378973 scopus 로고    scopus 로고
    • [Accessed on 24 January, 2012], 17, July
    • Spitzner L,. Honeytokens: the other honeypot. (Available from: http://www.symantec.com/connect/articles/honeytokens-other-honeypot) [Accessed on 24 January, 2012], 17, July 2003.
    • (2003) Honeytokens: The Other Honeypot
    • Spitzner, L.1
  • 34
    • 84937739333 scopus 로고    scopus 로고
    • [Accessed on 27 January, 2012], 13, November
    • Forensics Wiki. Prefetch. (Available from: http://www.forensicswiki.org/wiki/Prefetch) [Accessed on 27 January, 2012], 13, November 2011.
    • (2011) Forensics Wiki. Prefetch
  • 35
    • 84960376125 scopus 로고    scopus 로고
    • [Accessed on 27 January], 2012, September 2008
    • Parsonage H,. The meaning of linkfiles in forensic examinations. (Available from: http://computerforensics.parsonage.co.uk/downloads/TheMeaningofLIFE.pdf) [Accessed on 27 January], 2012, September 2008.
    • The Meaning of Linkfiles in Forensic Examinations
    • Parsonage, H.1
  • 36
    • 84893478856 scopus 로고    scopus 로고
    • [Accessed on 6 September 2012], 15, July
    • Galpin R,. Photorec. (Available from: http://www.cgsecurity.org/wiki/PhotoRec) [Accessed on 6 September 2012], 15, July 2011.
    • (2011) Photorec
    • Galpin, R.1
  • 37
    • 77950898182 scopus 로고    scopus 로고
    • Online, [Accessed on 14 March 2014]
    • Hughes G, Coughlin T,. Tutorial on disk drive data sanitization. Online, 2006. (Available from: http://cmrr.ucsd.edu/people/Hughes/documents/DataSanitizationTutorial.pdf) [Accessed on 14 March 2014].
    • (2006) Tutorial on Disk Drive Data Sanitization.
    • Hughes, G.1    Coughlin, T.2
  • 39
    • 70849107663 scopus 로고    scopus 로고
    • Empirical exploitation of live virtual machine migration
    • [Accessed on 14 March 2014]
    • Oberheide J, Cooke E, Jahanian F,. Empirical exploitation of live virtual machine migration. Proceedings of BlackHat DC Convention, 2008. (Available from: https://www.blackhat.com/presentations/bh-dc-08/Oberheide/Whitepaper/bh-dc-08-oberheide-WP.pdf) [Accessed on 14 March 2014].
    • (2008) Proceedings of BlackHat DC Convention
    • Oberheide, J.1    Cooke, E.2    Jahanian, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.