2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.484
|View full text |Cite
|
Sign up to set email alerts
|

EyeCloud: A BotCloud Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Through this process, they can detect the probability of botnet infection based on the process of independent Poisson process and detection based on negative selection. The authors in [38] proposed EyeCloud, a system that detects members of Botcloud that abuse cloud resources. To reach its goal, EyeCloud relies on Virtual Machine Introspection (VMI).…”
Section: Source-end Detection Of Ddos Attacksmentioning
confidence: 99%
“…Through this process, they can detect the probability of botnet infection based on the process of independent Poisson process and detection based on negative selection. The authors in [38] proposed EyeCloud, a system that detects members of Botcloud that abuse cloud resources. To reach its goal, EyeCloud relies on Virtual Machine Introspection (VMI).…”
Section: Source-end Detection Of Ddos Attacksmentioning
confidence: 99%
“…Memarian et al proposed EyeCloud , a system that detects members of a botcloud that abuse cloud resources. To achieve its goal, EyeCloud relies on Virtual Machine Introspection , a technique used in virtualization to inspect the memory space of a VM from a secure point that can be another VM (ie, Dom0 ).…”
Section: Related Work On Botcloud Detection Approachesmentioning
confidence: 99%
“…Even though cloud storage offers several advantages compared to traditional and local storage of data, cloud users are concerned about the integrity of stored data, security and user privacy issues [3,4]. There exist several solutions which could be considered by security experts in order to protect the stored data, and preserve privacy of the cloud users [5,6,7,8]. Adopting security mechanisms is useful in protecting data against being modified and accessed by unauthorized users, and make it difficult for the attackers to abuse the data.…”
Section: Introductionmentioning
confidence: 99%