메뉴 건너뛰기




Volumn , Issue , 2016, Pages 91-96

Detecting Intrusions in Federated Cloud Environments Using Security as a Service

Author keywords

Cloud Computing; Cloud Federation; Collaboration; Critical Infrastructure; Dempster shafer; Intrusion detection

Indexed keywords

CLOUD COMPUTING; COMPLEX NETWORKS; CRITICAL INFRASTRUCTURES; MERCURY (METAL);

EID: 84991108595     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DeSE.2015.28     Document Type: Conference Paper
Times cited : (1)

References (24)
  • 6
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • Jun
    • M. T. Khorshed, a. B. M. S. Ali, and S. a. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing, " Futur. Gener. Comput. Syst., vol. 28, no. 6, pp. 833-851, Jun. 2012.
    • (2012) Futur. Gener. Comput. Syst. , vol.28 , Issue.6 , pp. 833-851
    • Khorshed, M.T.1    Ali, S.M.A.B.2    Wasimi S, A.3
  • 12
    • 78049513508 scopus 로고    scopus 로고
    • A survey of intrusion detection and prevention systems
    • A. Patel, Q. Qassim, and C. Wills, "A survey of intrusion detection and prevention systems, " Inf. Manag. Comput. Secur., vol. 18, no. 4, pp. 277-290, 2010.
    • (2010) Inf. Manag. Comput. Secur. , vol.18 , Issue.4 , pp. 277-290
    • Patel, A.1    Qassim, Q.2    Wills, C.3
  • 14
    • 84988283226 scopus 로고    scopus 로고
    • A threat-aware hybrid intrusion-detection architecture for dynamic network environments
    • S. Neelakantan and S. Rao, "A Threat-Aware Hybrid Intrusion-Detection Architecture for Dynamic Network Environments, " CSI J. Comput., vol. 1, no. 3, 2012.
    • (2012) CSI J. Comput. , vol.1 , Issue.3
    • Neelakantan, S.1    Rao, S.2
  • 16
    • 84862180406 scopus 로고    scopus 로고
    • A coordinator for scaling elastic applications across multiple clouds
    • R. N. Calheiros, A. N. Toosi, C. Vecchiola, and R. Buyya, "A coordinator for scaling elastic applications across multiple clouds, " Futur. Gener. Comput. Syst., vol. 28, no. 8, pp. 1350-1362, 2012.
    • (2012) Futur. Gener. Comput. Syst. , vol.28 , Issue.8 , pp. 1350-1362
    • Calheiros, R.N.1    Toosi, A.N.2    Vecchiola, C.3    Buyya, R.4
  • 18
    • 84876261368 scopus 로고    scopus 로고
    • Cloud computingbased forensic analysis for collaborative network security management system
    • Z. Chen, F. Han, J. Cao, X. Jiang, and S. Chen, "Cloud computingbased forensic analysis for collaborative network security management system, " Tsinghua Sci. Technol., vol. 18, no. 1, pp. 40-50, 2013
    • (2013) Tsinghua Sci. Technol. , vol.18 , Issue.1 , pp. 40-50
    • Chen, Z.1    Han, F.2    Cao, J.3    Jiang, X.4    Chen, S.5
  • 19
    • 84903436399 scopus 로고    scopus 로고
    • Intrusion detection system in cloud computing environment
    • S. N. Dhage and B. B. Meshram, "Intrusion detection system in cloud computing environment, " Int. J. Cloud Comput., vol. 1, no. 2/3, p. 261, 2012.
    • (2012) Int. J. Cloud Comput. , vol.1 , Issue.2-3 , pp. 261
    • Dhage, S.N.1    Meshram, B.B.2
  • 22
    • 78049486291 scopus 로고    scopus 로고
    • Anomaly detection using the dempster-shafer method
    • Q. Chen and U. Aickelin, "Anomaly Detection Using the Dempster-Shafer Method, " in DMIN, 2006, pp. 232-240.
    • (2006) DMIN , pp. 232-240
    • Chen, Q.1    Aickelin, U.2
  • 24
    • 84940766710 scopus 로고    scopus 로고
    • Evaluating the effects of cascading failures in a network of critical infrastructures
    • W. Hurst and A. Macdermott, "Evaluating the Effects of Cascading Failures in a Network of Critical Infrastructures, " Inderscience Int. J. Syst. Syst. Eng., vol. 6, no. 3, pp. 1-12, 2015.
    • (2015) Inderscience Int. J. Syst. Syst. Eng. , vol.6 , Issue.3 , pp. 1-12
    • Hurst, W.1    Macdermott, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.