-
1
-
-
84885205587
-
Snortflow: A openflow-based intrusion prevention system in cloud environment
-
GREE, Salt Lake City, UT
-
T. Xing, D. Huang, L. Xu, C.-J. Chung, and P. Khatkar, "Snortflow: A openflow-based intrusion prevention system in cloud environment, "in GENI Research and Educational Experiment Workshop, GREE, Salt Lake City, UT, 2013.
-
(2013)
in GENI Research and Educational Experiment Workshop
-
-
Xing, T.1
Huang, D.2
Xu, L.3
Chung, C.-J.4
Khatkar, P.5
-
2
-
-
84897585209
-
Nice: Network intrusion detection and countermeasure selection in virtual network systems
-
C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, "Nice: Network intrusion detection and countermeasure selection in virtual network systems, "in IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Cloud Computing Assessment, vol. 10, no. 4, pp. 198-211, 2013.
-
(2013)
in IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Cloud Computing Assessment
, vol.10
, Issue.4
, pp. 198-211
-
-
Chung, C.-J.1
Khatkar, P.2
Xing, T.3
Lee, J.4
Huang, D.5
-
4
-
-
85015488655
-
Ec2 security revisite
-
K. Kell, "Ec2 security revisited, "in Online Blog, 2013.
-
(2013)
in Online Blog
-
-
Kell, K.1
-
5
-
-
84885680882
-
SourceFire Inc.
-
[Online]. Available
-
"SourceFire Inc." [Online]. Available: http://www.snort.org.
-
-
-
-
6
-
-
85015476927
-
-
[Online]. Available
-
"Suricata Inc." [Online]. Available: http://suricata-ids.org.
-
Suricata Inc.
-
-
-
8
-
-
70350656962
-
Nox: Towards an operating system for networks
-
July
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenkes, "Nox: Towards an operating system for networks, "in ACM SIGCOMM Computer Communication Review, Vol. 38, no. 3, pp. 105-110, July 2008.
-
(2008)
In ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenkes, S.7
-
9
-
-
85015498326
-
Citrix Systems, Inc
-
[Online]. Available
-
"Citrix Systems, Inc." [Online]. Available: http://www.citrix.com/products/xenserver.
-
-
-
-
10
-
-
85015494945
-
KVM
-
[Online]. Available
-
"KVM." [Online]. Available: http://www.linux-kvm.org.
-
-
-
-
11
-
-
33645402669
-
-
Prentice Hall Professional, Upper Saddle River, NJ
-
R. U. Rehman, Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall Professional, Upper Saddle River, NJ, 2003.
-
(2003)
Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID
-
-
Rehman, R.U.1
-
12
-
-
79951700744
-
Network-wide deployment of intrusion detection and prevention systems
-
New York, NY, USA: ACM. [Online]. Available
-
V. Sekar, R. Krishnaswamy, A. Gupta, and M. K. Reiter, "Network-wide deployment of intrusion detection and prevention systems, "in Proceedings of the 6th International Conference, ser. Co-NEXT '10. New York, NY, USA: ACM, 2010, pp. 18:1-18:12. [Online]. Available: http://doi.acm.org/10.1145/1921168.1921192.
-
(2010)
in Proceedings of the 6th International Conference, ser. Co-NEXT '10
, pp. 18:1-18:12
-
-
Sekar, V.1
Krishnaswamy, R.2
Gupta, A.3
Reiter, M.K.4
-
13
-
-
84948431640
-
Stateful intrusion detection for high-speed network's
-
Oakland, CA, 2002
-
C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer, "Stateful intrusion detection for high-speed network's, "in Proceedings. 2002 IEEE Symposium on Security and Privacy, 2002. Oakland, CA, 2002, pp. 285-293.
-
(2002)
In Proceedings. 2002 IEEE Symposium on Security and Privacy
, pp. 285-293
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
14
-
-
77954931494
-
Intrusion detection for grid and cloud computing, "IT Professional
-
July
-
K. Vieira, A. Schulter, C.Westphall, and C.Westphall, "Intrusion detection for grid and cloud computing, "IT Professional, vol. 12, no. 4, pp. 38-43, July 2010.
-
(2010)
, vol.12
, Issue.4
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.3
Westphall, C.4
-
15
-
-
74049138988
-
An extensible and virtualization-compatible IDs management architecture
-
Xi'An, China
-
S. Roschke, F. Cheng, and C. Meinel, "An extensible and virtualization-compatible IDs management architecture, "in Fifth International Conference on Information Assurance and Security, 2009 (IAS '09). vol. 2, Xi'An, China, 2009, pp. 130-134.
-
(2009)
In Fifth International Conference on Information Assurance and Security, 2009 (IAS '09)
, vol.2
, pp. 130-134
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
16
-
-
84860544941
-
Firecol: A collaborative protection network for the detection of flooding ddos attacks
-
Dec
-
J. Francois, I. Aib, and R. Boutaba, "Firecol: A collaborative protection network for the detection of flooding ddos attacks, "IEEE/ACM Transactions on Networking, vol. 20, no. 6, pp. 1828-1841, Dec 2012.
-
(2012)
IEEE/ACM Transactions on Networking
, vol.20
, Issue.6
, pp. 1828-1841
-
-
Francois, J.1
Aib, I.2
Boutaba, R.3
-
17
-
-
79955041204
-
Lightweight DDoS flooding attack detection using nox/openflow
-
Denever, CO, Oct
-
R. Braga, E. Mota, and A. Passito, "Lightweight DDoS flooding attack detection using nox/openflow, "in 2010 IEEE 35th Conference on Local Computer Networks (LCN), Denever, CO, Oct 2010, pp. 408-415.
-
(2010)
In 2010 IEEE 35th Conference on Local Computer Networks (LCN)
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
18
-
-
84906077010
-
Can we beat DDoS attacks in clouds?
-
September
-
S. Yu, Y. Tian, S. Guo, and D.Wu, "Can we beat DDoS attacks in clouds?, "IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2245-2254, September 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.9
, pp. 2245-2254
-
-
Yu, S.1
Tian, Y.2
Guo, S.3
Wu, D.4
-
19
-
-
84869431702
-
Towards a Bayesian network game framework for evaluating DDoS attacks and defense
-
New York: ACM. [Online]. Available
-
G. Yan, R. Lee, A. Kent, and D. Wolpert, "Towards a Bayesian network game framework for evaluating DDoS attacks and defense, "in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12. New York: ACM, 2012, pp. 553-566. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382255.
-
(2012)
in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12
, pp. 553-566
-
-
Yan, G.1
Lee, R.2
Kent, A.3
Wolpert, D.4
-
20
-
-
40749152296
-
Probabilistic packet marking for large-scale ip traceback
-
Feb. [Online]. Available
-
M. T. Goodrich, "Probabilistic packet marking for large-scale ip traceback, "IEEE/ACMTransactions on Networking, vol. 16, no. 1, pp. 15-24, Feb. 2008. [Online]. Available: http:// dx.doi.org/10.1109/TNET.2007.910594.
-
(2008)
IEEE/ACMTransactions on Networking
, vol.16
, Issue.1
, pp. 15-24
-
-
Goodrich, M.T.1
-
21
-
-
0038059205
-
IP traceback with deterministic packet marking
-
A. Belenky and N. Ansari, "IP traceback with deterministic packet marking, "IEEE Communications Letters, vol. 7, no. 4, pp. 162-164, 2003.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.4
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
22
-
-
79551523280
-
Traceback of ddos attacks using entropy variations
-
S. Yu, W. Zhou, R. Doss, and W. Jia, "Traceback of ddos attacks using entropy variations, "IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 3, pp. 412-425, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.3
, pp. 412-425
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Jia, W.4
-
23
-
-
84871561622
-
The power of software-defined networking: Line-rate content-based routing using openflow
-
New York: ACM
-
B. Koldehofe, F. Durr, M. A. Tariq, and K. Rothermel, "The power of software-defined networking: Line-rate content-based routing using openflow, "in Proceedings of the 7thWorkshop on Middleware for Next Generation Internet Computing, MW4NG '12. New York: ACM, 2012, pp. 3:1-3:6.
-
(2012)
In Proceedings of the 7thWorkshop on Middleware for Next Generation Internet Computing, MW4NG '12
, pp. 3:1-3:6
-
-
Koldehofe, B.1
Durr, F.2
Tariq, M.A.3
Rothermel, K.4
-
24
-
-
84870557554
-
Chronos: Predictable low latency for data center applications
-
New York: ACM
-
R. Kappor, G. Porter, M. Tewari, G. M. Voelker, and A. Vahdat, "Chronos: Predictable low latency for data center applications, "in Proceedings of the Third ACM Symposium on Cloud Computing, SoCC '12. New York: ACM, 2012, pp. 9:1-9:14.
-
(2012)
In Proceedings of the Third ACM Symposium on Cloud Computing, SoCC '12
, pp. 9:1-9:14
-
-
Kappor, R.1
Porter, G.2
Tewari, M.3
Voelker, G.M.4
Vahdat, A.5
-
25
-
-
79960190432
-
Network architecture for joint failure recovery and traffic engineering
-
New York: ACM
-
M. Suchara, D. Xu, R. Doverspike, D. Johnson, and J. Rexford, "Network architecture for joint failure recovery and traffic engineering, "in Proceedings of the ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '11, New York: ACM, 2011, pp. 97-108.
-
(2011)
In Proceedings of the ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '11
, pp. 97-108
-
-
Suchara, M.1
Xu, D.2
Doverspike, R.3
Johnson, D.4
Rexford, J.5
-
26
-
-
84874732253
-
QuagFlow: Partnering quagga with openflow
-
New York: ACM
-
M. R. Nascimento, C. E. Rothenberg, M. R. Salvador, and M. F. Magalhaes, "QuagFlow: Partnering quagga with openflow, "in Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM '10. New York: ACM, 2010, pp. 441-442.
-
(2010)
In Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM '10
, pp. 441-442
-
-
Nascimento, M.R.1
Rothenberg, C.E.2
Salvador, M.R.3
Magalhaes, M.F.4
-
27
-
-
84874562245
-
Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
-
Washington, DC: IEEE Computer Society. [Online]. Available
-
S. Shin and G. Gu, "Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?), "in Proceedings of the 2012 20th IEEE International Conference on Network Protocols (ICNP), ser. ICNP '12. Washington, DC: IEEE Computer Society, 2012, pp. 1-6. [Online]. Available: http://dx.doi.org/10.1109/ICNP.2012.6459946.
-
(2012)
In Proceedings of the 2012 20th IEEE International Conference on Network Protocols (ICNP), ser. ICNP '12
, pp. 1-6
-
-
Shin, S.1
Gu, G.2
-
28
-
-
85043718049
-
Extensible and scalable network monitoring using openSAFE
-
Berkeley, CA: USENIX Association
-
J. R. Ballard, I. Rae, and A. Akella, "Extensible and scalable network monitoring using openSAFE, "in Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, INM/WREN '10. Berkeley, CA: USENIX Association, 2010, p. 8.
-
(2010)
In Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, INM/WREN '10
, pp. 8
-
-
Ballard, J.R.1
Rae, I.2
Akella, A.3
-
30
-
-
84866518191
-
A security enforcement kernel for openflownetworks
-
NewYork:ACM. [Online].Available
-
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, "A security enforcement kernel for openflownetworks, "in Proceedings of the FirstWorkshop on Hot Topics in Software Defined Networks, ser. HotSDN '12. NewYork:ACM, 2012, pp. 121-126. [Online].Available: http://doi.acm.org/10.1145/2342441.2342466.
-
(2012)
In Proceedings of the FirstWorkshop on Hot Topics in Software Defined Networks, ser. HotSDN '12
, pp. 121-126
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
31
-
-
84893570087
-
Fresco: Modular composable security services for software-defined networks
-
February
-
S. Shin, P. A. Porras, V. Yegneswaran, M. W. Fong, G. Gu, and M. Tyson, "Fresco: Modular composable security services for software-defined networks, "in Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13), February 2013.
-
(2013)
In Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13)
-
-
Shin, S.1
Porras, P.A.2
Yegneswaran, V.3
Fong, M.W.4
Gu, G.5
Tyson, M.6
-
32
-
-
84962402837
-
Implementation of contentoriented networking architecture (cona): A focus on DDoS countermeasure
-
September
-
J. Suh, H.-G. Choi, W. Yoon, T. You, T. Kwon, and Y. Choi, "Implementation of contentoriented networking architecture (cona): A focus on DDoS countermeasure." September 2010.
-
(2010)
-
-
Suh, J.1
Choi, H.-G.2
Yoon, W.3
You, T.4
Kwon, T.5
Choi, Y.6
-
33
-
-
84864245314
-
A replication component for resilient openflow-based networking
-
April
-
P. Fonseca, R. Bennesby, E. Mota, and A. Passito, "A replication component for resilient openflow-based networking, "in Network Operations and Management Symposium (NOMS), 2012 IEEE, April 2012, pp. 933-939.
-
(2012)
In Network Operations and Management Symposium (NOMS), 2012 IEEE
, pp. 933-939
-
-
Fonseca, P.1
Bennesby, R.2
Mota, E.3
Passito, A.4
-
34
-
-
84889062725
-
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
-
S. Shin, V. Yegneswaran, P. Porras, and G. Gu, "Avant-guard: Scalable and vigilant switch flow management in software-defined networks, "in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ser. CCS '13, 2013, pp. 413-424.
-
(2013)
In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ser. CCS '13
, pp. 413-424
-
-
Shin, S.1
Yegneswaran, V.2
Porras, P.3
Gu, G.4
-
35
-
-
84893504888
-
Software-defined IDs for securing embedded mobile devices
-
Waltham, MA, Sept
-
R. Skowyra, S. Bahargam, and A. Bestavros, "Software-defined IDs for securing embedded mobile devices, "in High Performance Extreme Computing Conference (HPEC), 2013 IEEE, Waltham, MA, Sept 2013, pp. 1-7.
-
(2013)
In High Performance Extreme Computing Conference (HPEC), 2013 IEEE
, pp. 1-7
-
-
Skowyra, R.1
Bahargam, S.2
Bestavros, A.3
-
36
-
-
77952346235
-
Improving the accuracy of network intrusion detection system under load using selective packet discarding
-
New York: ACM
-
A. Papadogiannakis, M. Polychronakis, and E. O. Markatos, "Improving the accuracy of network intrusion detection system under load using selective packet discarding, "in Proceedings of the Third European Workshop on System Security, EUROSEC '10. New York: ACM, 2010, pp. 15-21.
-
(2010)
In Proceedings of the Third European Workshop on System Security, EUROSEC '10
, pp. 15-21
-
-
Papadogiannakis, A.1
Polychronakis, M.2
Markatos, E.O.3
-
38
-
-
84866521295
-
Openflow random host mutation: Transparent moving target defense using software defined networking
-
New York: ACM
-
J. H. Jafarian, E. AI-Shaer, and Q. Duan, "Openflow random host mutation: Transparent moving target defense using software defined networking, "in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN '12. New York: ACM, 2012, pp. 127-132.
-
(2012)
In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN '12
, pp. 127-132
-
-
Jafarian, J.H.1
AI-Shaer, E.2
Duan, Q.3
-
39
-
-
85015506783
-
Vmware vcloud networking and security overview
-
in white paper
-
V. Inc., "Vmware vcloud networking and security overview, "in white paper, 2012.
-
(2012)
-
-
-
40
-
-
84893525019
-
Non-intrusive process-based monitoring system to mitigate and prevent vm vulnerability explorations
-
Austin, TX. IEEE, Washington, DC
-
C.-J. Chung, J. Cui, P. Khatkar, and D. Huang, "Non-intrusive process-based monitoring system to mitigate and prevent vm vulnerability explorations, "in 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), Austin, TX. IEEE, Washington, DC, 2013, pp. 21-30.
-
(2013)
In 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom)
, pp. 21-30
-
-
Chung, C.-J.1
Cui, J.2
Khatkar, P.3
Huang, D.4
-
41
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
Apr
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "Openflow: Enabling innovation in campus networks, "in ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74. Apr, 2008.
-
(2008)
in ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
42
-
-
21644433634
-
Xen and the art of virtualization
-
New York
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfieldh, "Xen and the art of virtualization, "in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP), New York 2003.
-
(2003)
In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfieldh, A.9
-
43
-
-
84886584249
-
Performance evaluation study of intrusion detection systems
-
Niagara Falls, Canada
-
A. Alhomoud, R. Munir, J. P. Disso, I. Awan, and A. Al-Dhelaan, "Performance evaluation study of intrusion detection systems, "in The 2nd International Conference on Ambient System, Networks and Technologies, Niagara Falls, Canada, 2011.
-
(2011)
In The 2nd International Conference on Ambient System, Networks and Technologies
-
-
Alhomoud, A.1
Munir, R.2
Disso, J.P.3
Awan, I.4
Al-Dhelaan, A.5
-
44
-
-
85015497327
-
Back Track Linux
-
[Online]. Available
-
"Back Track Linux." [Online]. Available: http://www.backtrack-linux.org.
-
-
-
|