A Stealth Migration Approach to Moving Target Defense in Cloud Computing
暂无分享,去创建一个
[1] Sajjan G. Shiva,et al. Automated Live Migration in OpenStack:A Moving Target Defense Solution , 2017 .
[2] Scott A. DeLoach,et al. Mission-oriented moving target defense based on cryptographically strong network dynamics , 2013, CSIIRW '13.
[3] Saikat Das,et al. CoRuM: Collaborative Runtime Monitor Framework for Application Security , 2018, 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion).
[4] Mahadev Satyanarayanan,et al. Internet suspend/resume , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[5] Sajjan G. Shiva,et al. RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS , 2012 .
[6] Feng Xia,et al. Virtual machine migration in cloud data centers: a review, taxonomy, and open research issues , 2015, The Journal of Supercomputing.
[7] Sadie Creese,et al. Cloud Computing: Insider Attacks on Virtual Machines during Migration , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Srikanth V. Krishnamurthy,et al. Stealth migration: Hiding virtual machines on the network , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[9] Vitaly Shmatikov,et al. The Parrot Is Dead: Observing Unobservable Network Communications , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Umesh Deshpande,et al. Fast Server Deprovisioning through Scatter-Gather Live Migration of Virtual Machines , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[11] Anupam Tamrakar. Security in Live Migration of Virtual Machine with Automated Load Balancing , 2014 .
[12] Riccardo Bettati,et al. On effectiveness of link padding for statistical traffic analysis attacks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[13] Kenichi Kourai,et al. Split Migration of Large Memory Virtual Machines , 2016, APSys.
[14] Sajjan G. Shiva,et al. Runtime monitors for tautology based SQL injection attacks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).