메뉴 건너뛰기




Volumn , Issue , 2015, Pages 375-379

Ontology Based APT Attack Behavior Analysis in Cloud Computing

Author keywords

APT Attack; Inference Rules; Ontology

Indexed keywords

ONTOLOGY; PERSONAL COMPUTING;

EID: 84964974999     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BWCCA.2015.69     Document Type: Conference Paper
Times cited : (20)

References (17)
  • 1
    • 80052169144 scopus 로고    scopus 로고
    • Persistent threats and how to monitor and deter them
    • C. Tankard, "Persistent threats and how to monitor and deter them," Network security, vol. 2011, no. 8, pp. 16-19, 2011.
    • (2011) Network Security , vol.2011 , Issue.8 , pp. 16-19
    • Tankard, C.1
  • 2
    • 80051793908 scopus 로고    scopus 로고
    • Data preprocessing for anomaly based network intrusion detection: A review
    • J. Davis and A. Clarck, "Data preprocessing for anomaly based network intrusion detection: A review," Computers & Security, vol. 30, pp. 353-375, 2011.
    • (2011) Computers & Security , vol.30 , pp. 353-375
    • Davis, J.1    Clarck, A.2
  • 4
    • 84964932649 scopus 로고    scopus 로고
    • Reducing false negatives in intelligent intrusion detection decision response system
    • H. Kai, Y. Liu and L. Zhou, "Reducing false negatives in intelligent intrusion detection decision response system," Sanya, 2012.
    • (2012) Sanya
    • Kai, H.1    Liu, Y.2    Zhou, L.3
  • 5
    • 33846696048 scopus 로고    scopus 로고
    • A new taxonomy for comparing intrusion detection systems
    • C. Tucker, S. Furnell, B. Ghita and P. Brooke, "A new taxonomy for comparing intrusion detection systems," Internet Research, vol. 17, pp. 88-98, 2007.
    • (2007) Internet Research , vol.17 , pp. 88-98
    • Tucker, C.1    Furnell, S.2    Ghita, B.3    Brooke, P.4
  • 6
    • 84884206484 scopus 로고    scopus 로고
    • Probabilistic spatio-temporal inference for motion event understanding
    • Dec.
    • C. Choi, J. Choi, E. Lee, I. You, and P. Kim, "Probabilistic Spatio-Temporal Inference for Motion Event Understanding", Journal of Neurocomputing, vol. 122, pp. 24-32, Dec. 2013.
    • (2013) Journal of Neurocomputing , vol.122 , pp. 24-32
    • Choi, C.1    Choi, J.2    Lee, E.3    You, I.4    Kim, P.5
  • 10
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Applied Soft Computing, vol. 10, pp. 1-35, 2010.
    • (2010) Applied Soft Computing , vol.10 , pp. 1-35
    • Wu, S.1    Banzhaf, W.2
  • 11
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • Oakland
    • R. Sommer and V. Paxson, "Outside the Closed World: On Using Machine Learning for Network Intrusion Detection," in 2010 IEEE Symposium on Security and Privacy, Oakland, 2010.
    • (2010) 2010 IEEE Symposium on Security and Privacy
    • Sommer, R.1    Paxson, V.2
  • 13
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks an collaborative intrusion detection
    • C. Zhou, C. Leckie and S. Karunasekera, "A survey of coordinated attacks an collaborative intrusion detection," Computers & Security, vol. 29, pp. 124-140, 2010.
    • (2010) Computers & Security , vol.29 , pp. 124-140
    • Zhou, C.1    Leckie, C.2    Karunasekera, S.3
  • 14
    • 84862684188 scopus 로고    scopus 로고
    • Security threats and security policy in wireless sensor networks
    • Z. Shen, S. Liu, "Security Threats and Security Policy In Wireless Sensor Networks", AISS, Vol. 4, No. 10, pp. 166-173, 2012.
    • (2012) AISS , vol.4 , Issue.10 , pp. 166-173
    • Shen, Z.1    Liu, S.2
  • 16
    • 84893264720 scopus 로고    scopus 로고
    • A host-based anomaly detection approach by representing system calls as states of kernel modules
    • Mario Couture
    • S. S. Murtaza, et al., Mario Couture, "A host-based anomaly detection approach by representing system calls as states of kernel modules," Proc. of 24th Intl. Symposium on Software Reliability Engineering(ISSRE), pp. 431-440, 2013.
    • (2013) Proc. of 24th Intl. Symposium on Software Reliability Engineering(ISSRE) , pp. 431-440
    • Murtaza, S.S.1
  • 17
    • 84938889930 scopus 로고    scopus 로고
    • Host based anomaly detection using Fuzzy Genetic Approach (FGA)
    • H. Kaur and N. Gill, "Host based Anomaly Detection using Fuzzy Genetic Approach (FGA)," International Journal of Computer Applications, Vol. 74, No. 20, pp.5-9, 2013.
    • (2013) International Journal of Computer Applications , vol.74 , Issue.20 , pp. 5-9
    • Kaur, H.1    Gill, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.