A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed
暂无分享,去创建一个
[1] Rafael Moreno-Vozmediano,et al. Elastic management of cluster-based services in the cloud , 2009, ACDC '09.
[2] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[3] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[4] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[5] Borja Sotomayor,et al. Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.
[6] Vinod Yegneswaran,et al. Eureka: A Framework for Enabling Static Malware Analysis , 2008, ESORICS.
[7] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[8] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[9] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[10] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[11] T. Hashimoto,et al. Dynamic IP-VPN architecture for cloud computing , 2010, 8th Asia-Pacific Symposium on Information and Telecommunication Technologies.