메뉴 건너뛰기




Volumn , Issue , 2015, Pages 269-294

Cloud Security

Author keywords

Cloud security; FlowIPS design; IDPS solution; Network reconfiguration (NR) features; POX controllers; Software defined networking (SDN)

Indexed keywords

INTRUSION DETECTION; SOFTWARE DEFINED NETWORKING;

EID: 85015506899     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9781119042655.ch11     Document Type: Chapter
Times cited : (2)

References (44)
  • 4
    • 85015488655 scopus 로고    scopus 로고
    • Ec2 security revisite
    • K. Kell, "Ec2 security revisited, "in Online Blog, 2013.
    • (2013) in Online Blog
    • Kell, K.1
  • 5
    • 84885680882 scopus 로고    scopus 로고
    • SourceFire Inc.
    • [Online]. Available
    • "SourceFire Inc." [Online]. Available: http://www.snort.org.
  • 6
    • 85015476927 scopus 로고    scopus 로고
    • [Online]. Available
    • "Suricata Inc." [Online]. Available: http://suricata-ids.org.
    • Suricata Inc.
  • 9
    • 85015498326 scopus 로고    scopus 로고
    • Citrix Systems, Inc
    • [Online]. Available
    • "Citrix Systems, Inc." [Online]. Available: http://www.citrix.com/products/xenserver.
  • 10
    • 85015494945 scopus 로고    scopus 로고
    • KVM
    • [Online]. Available
    • "KVM." [Online]. Available: http://www.linux-kvm.org.
  • 12
    • 79951700744 scopus 로고    scopus 로고
    • Network-wide deployment of intrusion detection and prevention systems
    • New York, NY, USA: ACM. [Online]. Available
    • V. Sekar, R. Krishnaswamy, A. Gupta, and M. K. Reiter, "Network-wide deployment of intrusion detection and prevention systems, "in Proceedings of the 6th International Conference, ser. Co-NEXT '10. New York, NY, USA: ACM, 2010, pp. 18:1-18:12. [Online]. Available: http://doi.acm.org/10.1145/1921168.1921192.
    • (2010) in Proceedings of the 6th International Conference, ser. Co-NEXT '10 , pp. 18:1-18:12
    • Sekar, V.1    Krishnaswamy, R.2    Gupta, A.3    Reiter, M.K.4
  • 14
    • 77954931494 scopus 로고    scopus 로고
    • Intrusion detection for grid and cloud computing, "IT Professional
    • July
    • K. Vieira, A. Schulter, C.Westphall, and C.Westphall, "Intrusion detection for grid and cloud computing, "IT Professional, vol. 12, no. 4, pp. 38-43, July 2010.
    • (2010) , vol.12 , Issue.4 , pp. 38-43
    • Vieira, K.1    Schulter, A.2    Westphall, C.3    Westphall, C.4
  • 16
    • 84860544941 scopus 로고    scopus 로고
    • Firecol: A collaborative protection network for the detection of flooding ddos attacks
    • Dec
    • J. Francois, I. Aib, and R. Boutaba, "Firecol: A collaborative protection network for the detection of flooding ddos attacks, "IEEE/ACM Transactions on Networking, vol. 20, no. 6, pp. 1828-1841, Dec 2012.
    • (2012) IEEE/ACM Transactions on Networking , vol.20 , Issue.6 , pp. 1828-1841
    • Francois, J.1    Aib, I.2    Boutaba, R.3
  • 20
    • 40749152296 scopus 로고    scopus 로고
    • Probabilistic packet marking for large-scale ip traceback
    • Feb. [Online]. Available
    • M. T. Goodrich, "Probabilistic packet marking for large-scale ip traceback, "IEEE/ACMTransactions on Networking, vol. 16, no. 1, pp. 15-24, Feb. 2008. [Online]. Available: http:// dx.doi.org/10.1109/TNET.2007.910594.
    • (2008) IEEE/ACMTransactions on Networking , vol.16 , Issue.1 , pp. 15-24
    • Goodrich, M.T.1
  • 21
    • 0038059205 scopus 로고    scopus 로고
    • IP traceback with deterministic packet marking
    • A. Belenky and N. Ansari, "IP traceback with deterministic packet marking, "IEEE Communications Letters, vol. 7, no. 4, pp. 162-164, 2003.
    • (2003) IEEE Communications Letters , vol.7 , Issue.4 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 27
    • 84874562245 scopus 로고    scopus 로고
    • Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
    • Washington, DC: IEEE Computer Society. [Online]. Available
    • S. Shin and G. Gu, "Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?), "in Proceedings of the 2012 20th IEEE International Conference on Network Protocols (ICNP), ser. ICNP '12. Washington, DC: IEEE Computer Society, 2012, pp. 1-6. [Online]. Available: http://dx.doi.org/10.1109/ICNP.2012.6459946.
    • (2012) In Proceedings of the 2012 20th IEEE International Conference on Network Protocols (ICNP), ser. ICNP '12 , pp. 1-6
    • Shin, S.1    Gu, G.2
  • 32
    • 84962402837 scopus 로고    scopus 로고
    • Implementation of contentoriented networking architecture (cona): A focus on DDoS countermeasure
    • September
    • J. Suh, H.-G. Choi, W. Yoon, T. You, T. Kwon, and Y. Choi, "Implementation of contentoriented networking architecture (cona): A focus on DDoS countermeasure." September 2010.
    • (2010)
    • Suh, J.1    Choi, H.-G.2    Yoon, W.3    You, T.4    Kwon, T.5    Choi, Y.6
  • 39
    • 85015506783 scopus 로고    scopus 로고
    • Vmware vcloud networking and security overview
    • in white paper
    • V. Inc., "Vmware vcloud networking and security overview, "in white paper, 2012.
    • (2012)
  • 44
    • 85015497327 scopus 로고    scopus 로고
    • Back Track Linux
    • [Online]. Available
    • "Back Track Linux." [Online]. Available: http://www.backtrack-linux.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.