2013 IEEE Seventh International Symposium on Service-Oriented System Engineering 2013
DOI: 10.1109/sose.2013.27
|View full text |Cite
|
Sign up to set email alerts
|

Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…The lack of this vital feature leads to the negative impact of computational archetype, leading to personal, ethical, and financial damage. Security challenges are analyzed on three levels: Computational [33], communication, and data [34]. The security of cloud computing environments is becoming increasingly important in the context of the Internet of Things and the need for integration [35].…”
Section: Introductionmentioning
confidence: 99%
“…The lack of this vital feature leads to the negative impact of computational archetype, leading to personal, ethical, and financial damage. Security challenges are analyzed on three levels: Computational [33], communication, and data [34]. The security of cloud computing environments is becoming increasingly important in the context of the Internet of Things and the need for integration [35].…”
Section: Introductionmentioning
confidence: 99%
“…Qin [10] VLAN hopping (breaking network segregation), etc., have been cataloged by Laniepce [6] and will need to be quickly addressed in the future.…”
Section: Hypervisor Level (Virtualization Layer)mentioning
confidence: 99%
“…Joshi, N., and J. N. Varshapriya, (2013) [12] presented a framework for the detection of host-based and network-based activities in the virtualized environment using Virtual Machine Introspection El-Hajj, W., F. Aloul, Z. Trabelsi, and N. Zaki, (2008) [13] proposed a new approach to detect port scanning attacks using Fuzzy logics on Snort and analyzed that the integration of Fuzzy logics enhance the effectiveness to detect bad traffic. S. Laniepce, et al, (2013) [14] proposed a hypervisor-based model for intrusion detection in cloud environment and analyzed that the currently industrial solution are not sufficient as they only focus on network resource introspection. Authors also mentioned that there's need to investigate, how to charge for the Intrusion Detection and Prevention services from the user in the cloud.…”
Section: Related Workmentioning
confidence: 99%