Evaluating computer intrusion detection systems: A survey of common practices

A Milenkoski, M Vieira, S Kounev, A Avritzer… - ACM Computing …, 2015 - dl.acm.org
The evaluation of computer intrusion detection systems (which we refer to as intrusion
detection systems) is an active research area. In this article, we survey and systematize …

A survey of intrusion detection systems leveraging host data

RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …

Blockchain based data integrity service framework for IoT data

B Liu, XL Yu, S Chen, X Xu… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
It is a challenge to ensure data integrity for cloud-based Internet of Things (IoT) applications
because of the inherently dynamic nature of IoT data. The available frameworks of data …

[图书][B] Systems Benchmarking

S Kounev, KD Lange, J Von Kistowski - 2020 - Springer
In January of 2010, I met Sam and Klaus at the inaugural International Conference on
Performance Engineering (ICPE), in San Jose, USA. I gave the keynote address “Software …

Optimistic crash consistency

V Chidambaram, TS Pillai, AC Arpaci-Dusseau… - Proceedings of the …, 2013 - dl.acm.org
We introduce optimistic crash consistency, a new approach to crash consistency in
journaling file systems. Using an array of novel techniques, we demonstrate how to build an …

IRON file systems

V Prabhakaran, LN Bairavasundaram… - Proceedings of the …, 2005 - dl.acm.org
Commodity file systems trust disks to either work or fail completely, yet modern disks exhibit
more complex failure modes. We suggest a new fail-partial failure model for disks, which …

Ensuring data integrity in storage: Techniques and applications

G Sivathanu, CP Wright, E Zadok - … of the 2005 ACM workshop on …, 2005 - dl.acm.org
Data integrity is a fundamental aspect of storage security and reliability. With the advent of
network storage and new technology trends that result in new failure modes for storage …

A VMM-based intrusion prevention system in cloud computing environment

H Jin, G Xiang, D Zou, S Wu, F Zhao, M Li… - The Journal of …, 2013 - Springer
With the development of information technology, cloud computing becomes a new direction
of grid computing. Cloud computing is user-centric, and provides end users with leasing …

On securing untrusted clouds with cryptography

Y Chen, R Sion - Proceedings of the 9th annual ACM workshop on …, 2010 - dl.acm.org
In a recent interview, Whitfield Diffie argued that" the whole point of cloud computing is
economy" and while it is possible in principle for" computation to be done on encrypted …

SealFSv2: combining storage-based and ratcheting for tamper-evident logging

G Guardiola-Múzquiz, E Soriano-Salvador - International Journal of …, 2023 - Springer
Tamper-evident logging is paramount for forensic audits and accountability subsystems. It is
based on a forward integrity model: upon intrusion, the attacker is not able to counterfeit the …