메뉴 건너뛰기




Volumn 2015-January, Issue , 2015, Pages 195-203

Collaborative intrusion detection in a federated Cloud environment using the Dempster-Shafer theory of evidence

Author keywords

Cloud Computing; Cloud federation; Collaboration; Critical infrastructure; Dempster Shafer; Fusion algorithms; Intrusion detection; Security

Indexed keywords

CLOUD SECURITY; CRITICAL INFRASTRUCTURES; CYBERSECURITY; DISTRIBUTED DATABASE SYSTEMS; MONITORING; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 84940772838     PISSN: 20488602     EISSN: 20488610     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (13)
  • 1
    • 84878341131 scopus 로고    scopus 로고
    • Cloud monitoring: A survey
    • Aceto, G. et al., 2013. Cloud monitoring: A survey. Computer Networks, 57(9), pp. 2093-2115.
    • (2013) Computer Networks , vol.57 , Issue.9 , pp. 2093-2115
    • Aceto, G.1
  • 2
    • 78049486291 scopus 로고    scopus 로고
    • Anomaly detection using the dempster-shafer method
    • Chen, Q. & Aickelin, U., 2006. Anomaly Detection Using the Dempster-Shafer Method. In DMIN. pp. 232-240.
    • (2006) DMIN , pp. 232-240
    • Chen, Q.1    Aickelin, U.2
  • 3
    • 84904179031 scopus 로고    scopus 로고
    • Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection
    • Fragkiadakis, A. G. et al., 2013. Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Journal of Wireless Communications and Mobile Computing, 13.
    • (2013) Journal of Wireless Communications and Mobile Computing , pp. 13
    • Fragkiadakis, A.G.1
  • 5
    • 49649115473 scopus 로고    scopus 로고
    • Opening the Pandora's box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks
    • Joseph, J. F. C. et al., 2008. Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks. Computer Communications, 31(14), pp. 3178-3189.
    • (2008) Computer Communications , vol.31 , Issue.14 , pp. 3178-3189
    • Joseph, J.F.C.1
  • 6
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • Khorshed, M. T., Ali, a. B. M. S. & Wasimi, S. a., 2012. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Computer Systems, 28(6), pp. 833-851.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.6 , pp. 833-851
    • Khorshed, M.T.1    Ali, A.B.M.S.2    Wasimi, S.A.3
  • 7
    • 2442465295 scopus 로고    scopus 로고
    • A taxonomy for software voting algorithms used in safety-critical systems
    • Latif-Shabgahi, G., Bass, J. M. & Bennett, S., 2004. A Taxonomy for Software Voting Algorithms Used in Safety-Critical Systems. IEEE Transactions on Reliability, 53(3), pp. 319-328.
    • (2004) IEEE Transactions on Reliability , vol.53 , Issue.3 , pp. 319-328
    • Latif-Shabgahi, G.1    Bass, J.M.2    Bennett, S.3
  • 8
  • 13
    • 84940726498 scopus 로고    scopus 로고
    • Operation, management, security and sustainability for cloud computing
    • Westphall, C. B. et al., 2014. Operation, Management, Security and Sustainability for Cloud Computing. Information Systems, 13, pp. 30-50.
    • (2014) Information Systems , vol.13 , pp. 30-50
    • Westphall, C.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.