A survey of intrusion detection techniques in Cloud

Article English OPEN
Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.;
(2013)

Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision... View more
  • References (65)
    65 references, page 1 of 7

    [1] P. Mell, and T. Grance. (2011). The NIST Definition of Cloud Computing (Draft). NIST [Online]. Available: http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800- 145_cloud-definition.pdf

    [2] Google apps. [Online]. Available: http://www.google.com/apps/business

    [3] “Google apps engine.” [Online]. Available: URL http://code.google.com/appengine.

    [4] Azure services platform. [Online]. Available: http://www.microsoft.com/azure

    [5] Amazon web services. [Online]. Available: http://aws.amazon.com

    [6] Eucalyptus. [Online]. Available: http://eucalyptus.cs.ucsb.edu/.

    [7] Opennebula. [Online]. Available: http://www.opennebula.org

    [8] International Data Corporation. 2009. [Online]. Available: http://blogs.idc.com/ie/wpcontent/uploads/2009/12/idc_cloud_challenge s_2009.jpg, 2009.

    [9] Lockheed Martin White Paper: Available: http://www.lockheedmartin.com/data/assets/isgs/documents/CloudComp utingWhitePaper.pdf

    [10] C. Brooks. Amazon EC2 Attack Prompts Customer Support Changes. Tech Target. [Online]. Available: http://searchcloudcomputing.techtarget.com/news/article/0,289142,sid20 1_gci1371090,00.html

  • Metrics
Share - Bookmark