2011 IEEE Third International Conference on Cloud Computing Technology and Science 2011
DOI: 10.1109/cloudcom.2011.35
|View full text |Cite
|
Sign up to set email alerts
|

An Autonomous Agent Based Incident Detection System for Cloud Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(25 citation statements)
references
References 10 publications
0
25
0
Order By: Relevance
“…Santos et al [20] address the problem of creating a trustworthy cloud infrastructure by giving the cloud user an opportunity to verify the confidentiality and integrity of his own data and VMs. Doelitzscher et al [7] designed a security audit system for IaaS. This means that trust into a cloud infrastructure can be enforced not only by contracts (SLAs), but also by technical mechanisms.…”
Section: System Model and Security Assumptionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Santos et al [20] address the problem of creating a trustworthy cloud infrastructure by giving the cloud user an opportunity to verify the confidentiality and integrity of his own data and VMs. Doelitzscher et al [7] designed a security audit system for IaaS. This means that trust into a cloud infrastructure can be enforced not only by contracts (SLAs), but also by technical mechanisms.…”
Section: System Model and Security Assumptionsmentioning
confidence: 99%
“…Clients and the service calls are realized with the tool ab 7 . For each VM, the web service is called 2,500 times with 25 concurrent requests.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…The challenges are quite well understood, with a major one regarding categorising the "normal region" and deciding whether or not an anomaly is of malicious character. With respect to related work, we are unaware of such on devising algorithms for detecting behavioural anomalies in cloud based audit systems; with Doelitzscher et al [Doelitzscher et al, 2011] noting this as future work. In later work, the same authors applied neural networks to learn a behavioural model of the user [Doelitzscher et al, 2013].…”
Section: Introductionmentioning
confidence: 99%
“…Doelitzscher et al [71] emphasize security as a major research area in cloud computing. They also highlight the lack of flexibility of classic intrusion detection mechanisms to handle virtualized environments, suggesting the use of special security audit tools associated to business flow modeling through security SLAs.…”
Section: Books Papers and Other Publicationsmentioning
confidence: 99%