Article Information  
A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

Keywords: Cloud computing, Cloud security, Intrusion severity analysis, Intrusion Detection, Intrusion Response.

Mehran University Research Journal of Engineering & Technology

Volume 31 ,  Issue 1

Junaid   Arshad , Imran  Ali  Jokhio , Paul  Townend  ,

References
1. Goldberg, R.P., "A Survey of Virtual Machine Research", IEEE Computer, Volume 7, pp. 34-45, 1974.
2. Mell, P., and Grance, T., "A NIST National Definition of Cloud Computing", available at: http://csrc.nist.gov/ groups/SNS/cloud-computing/cloud-def-v15.doc
3. IT Cloud Services User Survey, Part-2: Top Benefits and Challenges. Available online at: http://blogs.idc.com/ie/ ?p=210, October 2008.
4. New IDC IT Cloud Services Survey: Top Benefits and Challenges. Available online at: http://blogs.idc.com/ie/ ?p=730, December, 2009.
5. Pearson, S., "Taking Account of Privacy when Designing Cloud Computing Services", Proceedings of CLOUD'09, Vancouver, Canada 978-1-4244-3713-9/09/ May 23, 2009.
6. Herald, R., "Privacy and Cloud Computing Challenges", Appeared in Infosec, Available online at: https:// www.infosecisland.com/blogview/3539-Privacy-and- Cloud-Computing-Challenges.html 16th April 2010.
7. Dournaee, B., "Taking Control of the Cloud for Your Enterprise", Intel SOA Expressway Cloud Security White Paper, 2010.
8. Stakhanova, N., Basu, S., and Wong, J., "A Taxonomy of Intrusion Response Systems", International Journal of Information and Security. Inderscience Publishers.
9. Schnackenberg, D., Holliday, H., Smith, R., et al, "Cooperative Intrusion Traceback and Response Architecture (CITRA)", Proceedings, IEEE DARPA Information Survivability Conference and Exposition (DISCEX I), 2001.
10. Porras, P., and Neumann, P., "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances", Proceedings of the National Information Systems Security Conference, 1997.
11. Community Emergency Response Team, available at: http:// www.cert.org
12. Northcutt, S., and Novak, J., "Network Intrusion Detection: An Analyst's Handbook", 3rd edition New Riders Publishing Thousand Oaks, CA, USA ISBN:0735712654
13. Mell, P., and Scarfone, K., "A Complete Guide to the Common Vulnerability Scoring System" Version 2.0 available at: www.first.org/cvss/cvss-guide.html
14. Arshad, J., "Integrated Intrusion Detection and Diagnosis for Clouds", Proceedings of Dependable Systems and Networks (DSN), Student Forum 2009.
15. Porras, P. A., Fong, M. W., and Valdes, A., "A Mission- Impact-Based Approach to INFOSEC Alarm Correlation", Proceedings of RAID pp. 95-114, 2002.
16. Barham, P., Dragovic, B., Fraser, K., et al, "Xen and the Art of Virtualization", Proceedings of SOSP'03, October 19-22, 2003
17. Arshad, J., Townend, P., and Xu, J., "Quantification of Security for Compute Intensive workloads in Clouds", Proceedings of the International Conference on Parallel and Distributed Systems (ICPADS), 2009.
18. Arshad, J., Townend, P., and Xu, J., "A Novel Intrusion Severity Analysis Approach for Clouds", International Journal of Future Generation Computer Systems Special Issue for Clouds, 2011 (To be Published).
19. Brackney, R., "Cyber-Intrusion Response", Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems, West Lafayette, 1998.
20. Quinlan, J.R., "C4.5: Programs for Machine Learning", Morgan Kaufmann Publishers, 1993.
21. Weka-Data Mining with Open Source Machine Learning Software in Java. Available at: http:// www.cs.waikato.ac.nz/ml/weka/
22. Usher, A.T., "The Future of Network Intrusion Detection", The Newsletter for Information Assurance Technology Professionals, Volume 7, 2005.
23. Somayaji, A., and Forrest, S., "Automated Response Using System Call Delays", Proceedings of the 9th Conference on USENIX Security Symposium, Volume 9, 2000.
24. Huai, J., Li, Q., and Hu, C., "CIVIC: A Hypervisor Based Computing Environment”, Proceedings of the International Conference on Parallel Processing Workshops, pp. 809-820, 2007.
25. Bouzida, Y., and Cuppens, F., "Neural Networks vs. Decision Trees for Intrusion Detection", Proceedings of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM), Tuebingen, Germany, 28-29 September 2006.
26. Kang, D-K., Fuller, D., and Honavar, V., "Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls", Proceedings of the IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 2005.