Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud
暂无分享,去创建一个
Sailik Sengupta | Subbarao Kambhampati | Dijiang Huang | Ankur Chowdhary | S. Kambhampati | Dijiang Huang | Ankur Chowdhary | Sailik Sengupta
[1] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[2] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[3] Yevgeniy Vorobeychik,et al. Optimal interdiction of attack plans , 2013, AAMAS.
[4] Nora Cuppens-Boulahia,et al. A Service Dependency Model for Cost-Sensitive Intrusion Response , 2010, ESORICS.
[5] Dijiang Huang,et al. SDN based Scalable MTD solution in Cloud Network , 2016, MTD@CCS.
[6] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[7] Paul R. Milgrom,et al. Designing Random Allocation Mechanisms: Theory and Applications , 2013 .
[8] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Zhisheng Hu,et al. Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs , 2017, MTD@CCS.
[10] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[11] Sailik Sengupta,et al. Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract) , 2016, AAMAS.
[12] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[13] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[14] Christoph Meinel,et al. An Extensible and Virtualization-Compatible IDS Management Architecture , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[15] R. K. Bunkar,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2014 .
[16] Kamalrulnizam Abu Bakar,et al. Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.
[17] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[18] Milind Tambe,et al. From physical security to cybersecurity , 2015, J. Cybersecur..
[19] Cliff Riggs. Intrusion Detection Systems , 2003 .
[20] Sailik Sengupta,et al. A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications , 2017, AAMAS.
[21] Azer Bestavros,et al. Markov Modeling of Moving Target Defense Games , 2016, MTD@CCS.
[22] Haengnam Sung,et al. A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models , 2015 .
[23] R. Chitra,et al. Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .
[24] Sushil Jajodia,et al. A moving target defense approach to mitigate DDoS attacks against proxy-based architectures , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[25] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[26] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[27] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[28] Sushil Jajodia,et al. A Moving Target Defense Approach to Disrupting Stealthy Botnets , 2016, MTD@CCS.
[29] Sateesh K. Peddoju,et al. HIDS: A host based intrusion detection system for cloud computing environment , 2014, International Journal of System Assurance Engineering and Management.
[30] Sailik Sengupta,et al. MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense , 2017, AAAI Workshops.
[31] Yevgeniy Vorobeychik,et al. Near-Optimal Interdiction of Factored MDPs , 2017, UAI.
[32] Alexander V. Outkin,et al. Evaluating Moving Target Defense with PLADD , 2015 .
[33] L. Ibrahim. ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .
[34] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[35] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[36] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[37] Sushil Jajodia,et al. SHARE , 2018, ACM Transactions on Internet Technology.
[38] Vamsi Popuri. Intrusion detection for grid and cloud computing , 2011 .
[39] Omar Al-Jarrah,et al. Network Intrusion Detection System Using Neural Network Classification of Attack Behavior , 2015 .
[40] Kusum Deep,et al. Soft computing for problem solving (SocProS 2015) , 2018, Int. J. Syst. Assur. Eng. Manag..
[41] Branislav Bosanský,et al. Optimal Network Security Hardening Using Attack Graph Games , 2015, IJCAI.
[42] Scott A. DeLoach,et al. Towards a Theory of Moving Target Defense , 2014, MTD '14.
[43] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[44] Dijiang Huang,et al. MTD Analysis and evaluation framework in Software Defined Network (MASON) , 2018, SDN-NFV@CODASPY.