Evaluating computer intrusion detection systems: A survey of common practices
The evaluation of computer intrusion detection systems (which we refer to as intrusion
detection systems) is an active research area. In this article, we survey and systematize …
detection systems) is an active research area. In this article, we survey and systematize …
A survey of intrusion detection systems leveraging host data
RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …
Blockchain based data integrity service framework for IoT data
It is a challenge to ensure data integrity for cloud-based Internet of Things (IoT) applications
because of the inherently dynamic nature of IoT data. The available frameworks of data …
because of the inherently dynamic nature of IoT data. The available frameworks of data …
[图书][B] Systems Benchmarking
In January of 2010, I met Sam and Klaus at the inaugural International Conference on
Performance Engineering (ICPE), in San Jose, USA. I gave the keynote address “Software …
Performance Engineering (ICPE), in San Jose, USA. I gave the keynote address “Software …
Optimistic crash consistency
We introduce optimistic crash consistency, a new approach to crash consistency in
journaling file systems. Using an array of novel techniques, we demonstrate how to build an …
journaling file systems. Using an array of novel techniques, we demonstrate how to build an …
IRON file systems
V Prabhakaran, LN Bairavasundaram… - Proceedings of the …, 2005 - dl.acm.org
Commodity file systems trust disks to either work or fail completely, yet modern disks exhibit
more complex failure modes. We suggest a new fail-partial failure model for disks, which …
more complex failure modes. We suggest a new fail-partial failure model for disks, which …
Ensuring data integrity in storage: Techniques and applications
G Sivathanu, CP Wright, E Zadok - … of the 2005 ACM workshop on …, 2005 - dl.acm.org
Data integrity is a fundamental aspect of storage security and reliability. With the advent of
network storage and new technology trends that result in new failure modes for storage …
network storage and new technology trends that result in new failure modes for storage …
A VMM-based intrusion prevention system in cloud computing environment
With the development of information technology, cloud computing becomes a new direction
of grid computing. Cloud computing is user-centric, and provides end users with leasing …
of grid computing. Cloud computing is user-centric, and provides end users with leasing …
On securing untrusted clouds with cryptography
Y Chen, R Sion - Proceedings of the 9th annual ACM workshop on …, 2010 - dl.acm.org
In a recent interview, Whitfield Diffie argued that" the whole point of cloud computing is
economy" and while it is possible in principle for" computation to be done on encrypted …
economy" and while it is possible in principle for" computation to be done on encrypted …
SealFSv2: combining storage-based and ratcheting for tamper-evident logging
G Guardiola-Múzquiz, E Soriano-Salvador - International Journal of …, 2023 - Springer
Tamper-evident logging is paramount for forensic audits and accountability subsystems. It is
based on a forward integrity model: upon intrusion, the attacker is not able to counterfeit the …
based on a forward integrity model: upon intrusion, the attacker is not able to counterfeit the …