Title
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
Abstract
Cloud computing has not only become attractive for organizations and end-users but also for attackers that use cloud environments to exploit the offered economies of scale—a cloud environment consists of a large set of systems with an excellent network connectivity setup and similar configurations. In this paper, we propose a comprehensive approach towards monitoring cloud computing environments b...
Year
DOI
Venue
2016
10.1147/JRD.2016.2571580
IBM Journal of Research and Development
Keywords
Field
DocType
Monitoring,Cloud computing,Computer security,Passive networks,Malware,Virtual machining,IP networks
Advanced persistent threat,Visibility,Computer security,Computer science,Network layer,Exploit,Cloud computing security,Analytics,Big data,Cloud computing
Journal
Volume
Issue
ISSN
60
4
0018-8646
Citations 
PageRank 
References 
0
0.34
0
Authors
8
Name
Order
Citations
PageRank
S. Berger135325.64
Yangyi Chen220.73
Xin Hu344530.43
Dimitrios Pendarakis498981.72
Josyula R. Rao5934115.07
Reiner Sailer61908143.12
Douglas Lee Schales712421.65
Marc Ph. Stoecklin816615.05