CIDS: A framework for intrusion detection in cloud systems
HA Kholidy, F Baiardi - 2012 Ninth International Conference on …, 2012 - ieeexplore.ieee.org
By impersonating legitimate users, intruders can use the abundant resources of cloud
computing environments. This paper develops a framework for" CIDS" a cloud based …
computing environments. This paper develops a framework for" CIDS" a cloud based …
[PDF][PDF] An overview of recent advances in intrusion detection
M Marhusin, D Cornforth, H Larkin - 2008 - dro.deakin.edu.au
The intrusion detection system is one of the security defense tools for computer networks. In
recent years this research has lacked in direction and focus. In this paper we present a …
recent years this research has lacked in direction and focus. In this paper we present a …
Intrusion detection for computational grids
Current intrusion detection technology is limited in providing protection against the
intrusions that may violate the security of computational grids. We present the problem of …
intrusions that may violate the security of computational grids. We present the problem of …
A grid-based intrusion detection system
A Schulter, JA Reis, F Koch… - … Conference on Systems …, 2006 - ieeexplore.ieee.org
This paper presents the problem of intrusion detection in grid environments. Current
intrusion detection technology is limited in providing protection against the attacks that may …
intrusion detection technology is limited in providing protection against the attacks that may …
Towards grid-based intrusion detection
Current intrusion detection technology is limited in providing protection against the
intrusions that may violate the security of computational grids. We present the problem of …
intrusions that may violate the security of computational grids. We present the problem of …
A streaming intrusion detection system for grid computing environments
M Smith, F Schwarzer, M Harbach… - 2009 11th IEEE …, 2009 - ieeexplore.ieee.org
In this paper, a novel architecture for a streaming intrusion detection system for Grid
computing environments is presented. Detection mechanisms based on traditional log-files …
computing environments is presented. Detection mechanisms based on traditional log-files …
Intrusion detection system for grid computing using SNORT
M Kumar, M Hanumanthappa… - 2012 International …, 2012 - ieeexplore.ieee.org
Because of distributed nature, grid computing environments are easy targets for intruders
looking for possible vulnerabilities to exploit [1]. By impersonating legitimate users, the …
looking for possible vulnerabilities to exploit [1]. By impersonating legitimate users, the …
Detecting global anomalies
S Srinivasa, PS Pawar - US Patent 8,296,850, 2012 - Google Patents
Abstract Systems and methods of detecting distributed attacks that pose a threat affecting
more than one node in the network. The distributed attacks include events that appear …
more than one node in the network. The distributed attacks include events that appear …
Fast attack detection using correlation and summarizing of security alerts in grid computing networks
RH Syed, J Pazardzievska, J Bourgeois - The Journal of Supercomputing, 2012 - Springer
Due to the extensive growth of grid computing networks, security is becoming a challenge.
Usual solutions are not enough to prevent sophisticated attacks fabricated by multiple users …
Usual solutions are not enough to prevent sophisticated attacks fabricated by multiple users …
GHIDS: Defending computational grids against misusing of shared resources
G Feng, X Dong, W Liu, Y Chu… - 2006 IEEE Asia-Pacific …, 2006 - ieeexplore.ieee.org
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional
Host-based Intrusion Detecting System (HIDS) is not suitable for grid environment. Grid …
Host-based Intrusion Detecting System (HIDS) is not suitable for grid environment. Grid …