Title | ||
---|---|---|
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility. |
Abstract | ||
---|---|---|
Cloud computing has not only become attractive for organizations and end-users but also for attackers that use cloud environments to exploit the offered economies of scale—a cloud environment consists of a large set of systems with an excellent network connectivity setup and similar configurations. In this paper, we propose a comprehensive approach towards monitoring cloud computing environments b... |
Year | DOI | Venue |
---|---|---|
2016 | 10.1147/JRD.2016.2571580 | IBM Journal of Research and Development |
Keywords | Field | DocType |
Monitoring,Cloud computing,Computer security,Passive networks,Malware,Virtual machining,IP networks | Advanced persistent threat,Visibility,Computer security,Computer science,Network layer,Exploit,Cloud computing security,Analytics,Big data,Cloud computing | Journal |
Volume | Issue | ISSN |
60 | 4 | 0018-8646 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
8 |
Name | Order | Citations | PageRank |
---|---|---|---|
S. Berger | 1 | 353 | 25.64 |
Yangyi Chen | 2 | 2 | 0.73 |
Xin Hu | 3 | 445 | 30.43 |
Dimitrios Pendarakis | 4 | 989 | 81.72 |
Josyula R. Rao | 5 | 934 | 115.07 |
Reiner Sailer | 6 | 1908 | 143.12 |
Douglas Lee Schales | 7 | 124 | 21.65 |
Marc Ph. Stoecklin | 8 | 166 | 15.05 |