Efficient and effective NIDS for cloud virtualization environment
暂无分享,去创建一个
[1] S. Goasguen,et al. An Evaluation of KVM for Use in Cloud Computing , 2008 .
[2] Stevan Mrdalj,et al. Would Cloud Computing Revolutionize Teaching Business Intelligence Courses , 2011 .
[3] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[4] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[5] Jason Nieh. Examining VMware , 2000 .
[6] Farnam Jahanian,et al. Defeating TCP/IP Stack Fingerprinting , 2000, USENIX Security Symposium.
[7] Greg Taleck,et al. Ambiguity Resolution via Passive OS Fingerprinting , 2003, RAID.
[8] Ryan Spangler,et al. Analysis of Remote Active Operating System Fingerprinting Tools , 2003 .
[9] A. Kivity,et al. kvm : the Linux Virtual Machine Monitor , 2007 .
[10] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[11] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[12] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.