Active deception model for securing cloud infrastructure
暂无分享,去创建一个
Raheem A. Beyah | John A. Copeland | A. Selcuk Uluagac | Albert Brzeczko | R. Beyah | J. Copeland | A. Uluagac | A. Brzeczko
[1] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[2] Maximillian Dornseif,et al. Modelling the costs and benefits of Honeynets , 2004, ArXiv.
[3] R. Real,et al. The Probabilistic Basis of Jaccard's Index of Similarity , 1996 .
[4] Marc Dacier,et al. A framework for attack patterns' discovery in honeynet data , 2008 .
[5] Constantinos Evangelinos,et al. Cloud Computing for parallel Scientific HPC Applications: Feasibility of Running Coupled Atmosphere- , 2008 .
[6] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[7] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[8] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[9] Lance Spitzner,et al. The Honeynet Project: Trapping the Hackers , 2003, IEEE Secur. Priv..
[10] Yan Chen,et al. Honeynet-based Botnet Scan Traffic Analysis , 2008, Botnet Detection.