2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences 2009
DOI: 10.1109/advcomp.2009.34
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Intrusion Detection in Clouds Using Mobile Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(45 citation statements)
references
References 7 publications
0
45
0
Order By: Relevance
“…In more detail, we denote µ to be the mean vector of the resulting snapshot IMFs matrix Y (t) 5 for each feature column f (t) in a V M (t). Having µ for every f (t) we now have a newly composed matrix X(t) = [µ 1 , µ 2 , · · · , µ n ] that provides a summarizing IMF description for each VM snapshot.…”
Section: B Anomaly Detection Methods 1) General Notationmentioning
confidence: 99%
See 2 more Smart Citations
“…In more detail, we denote µ to be the mean vector of the resulting snapshot IMFs matrix Y (t) 5 for each feature column f (t) in a V M (t). Having µ for every f (t) we now have a newly composed matrix X(t) = [µ 1 , µ 2 , · · · , µ n ] that provides a summarizing IMF description for each VM snapshot.…”
Section: B Anomaly Detection Methods 1) General Notationmentioning
confidence: 99%
“…Similarly with the first steps in the construction of the normal behaviour, every tested VM snapshot has to firstly be transformed by the E-EMD algorithm 5 Due to the fact that some features were shown to be decomposed by a lesser or one more IMFs than others we had to empirically refine our initial measurement matrix and work on subset matrices that had the same dimensions. After computing the summarizing statistics we could then aggregate all of them together and reconstruct the initial measurement matrix.…”
Section: B Anomaly Detection Methods 1) General Notationmentioning
confidence: 99%
See 1 more Smart Citation
“…The IDS instance that collects data is often known as a probe or sensor. An exemplary solution following this approach is described in [25], where authors proposed that IDS instances located in different regions of the provider's network are able independently to detect attacks and "warn" proper network devices operating in other regions.…”
Section: Intrusion Detection In Cloud Systemsmentioning
confidence: 99%
“…In [16] the VMs are attached to MA, which collects evidences of an attack from all the attacked VMs for further analysis and auditing. Then, they have to correlate and aggregate that data to detect distributed attacks.…”
Section: Relevant Work and Limitationsmentioning
confidence: 99%