2018
DOI: 10.4108/eai.4-1-2018.153526
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud

Abstract: Cloud computing, with the paradigm of computing as a utility, has the potential to significantly tranform the IT industry. Attracted by the high efficiency, low cost, and great flexibility of cloud, enterprises began to migrate large parts of their networks into cloud. The cloud becomes a public space where multiple "tenants" reside. Except for some public services, the enterprise networks in cloud should be absolutely isolated from each other. However, some "stealthy bridges" could be established to break suc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…They also introduced an extensive list of 60 new interaction rules. Cloud computing: Sun et al [69], [70] referred to two cloud risks: virtual machine (VM) images may be shared between different users, and VMs owned by different tenants may coreside on the same physical host machine. Sun et al [77] dealt with the gap between mission impact assessment and cyber resilience in the context of cloud computing.…”
Section: Extension Findingsmentioning
confidence: 99%
“…They also introduced an extensive list of 60 new interaction rules. Cloud computing: Sun et al [69], [70] referred to two cloud risks: virtual machine (VM) images may be shared between different users, and VMs owned by different tenants may coreside on the same physical host machine. Sun et al [77] dealt with the gap between mission impact assessment and cyber resilience in the context of cloud computing.…”
Section: Extension Findingsmentioning
confidence: 99%