A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds
Keywords: Cloud computing, Cloud security, Intrusion severity analysis, Intrusion Detection, Intrusion
Response.
Mehran University Research Journal of Engineering & Technology
Volume 31 , Issue 1
Junaid Arshad , Imran Ali Jokhio , Paul Townend ,
References
1. |
Goldberg, R.P., "A Survey of Virtual Machine Research",
IEEE Computer, Volume 7, pp. 34-45, 1974. |
2. |
Mell, P., and Grance, T., "A NIST National Definition
of Cloud Computing", available at: http://csrc.nist.gov/
groups/SNS/cloud-computing/cloud-def-v15.doc |
3. |
IT Cloud Services User Survey, Part-2: Top Benefits and
Challenges. Available online at: http://blogs.idc.com/ie/
?p=210, October 2008. |
4. |
New IDC IT Cloud Services Survey: Top Benefits and
Challenges. Available online at: http://blogs.idc.com/ie/
?p=730, December, 2009. |
5. |
Pearson, S., "Taking Account of Privacy when Designing
Cloud Computing Services", Proceedings of CLOUD'09,
Vancouver, Canada 978-1-4244-3713-9/09/ May 23,
2009. |
6. |
Herald, R., "Privacy and Cloud Computing Challenges",
Appeared in Infosec, Available online at: https://
www.infosecisland.com/blogview/3539-Privacy-and-
Cloud-Computing-Challenges.html 16th April 2010. |
7. |
Dournaee, B., "Taking Control of the Cloud for Your
Enterprise", Intel SOA Expressway Cloud Security White
Paper, 2010. |
8. |
Stakhanova, N., Basu, S., and Wong, J., "A Taxonomy
of Intrusion Response Systems", International Journal
of Information and Security. Inderscience Publishers. |
9. |
Schnackenberg, D., Holliday, H., Smith, R., et al,
"Cooperative Intrusion Traceback and Response
Architecture (CITRA)", Proceedings, IEEE DARPA
Information Survivability Conference and Exposition
(DISCEX I), 2001. |
10. |
Porras, P., and Neumann, P., "EMERALD: Event
Monitoring Enabling Responses to Anomalous Live
Disturbances", Proceedings of the National Information
Systems Security Conference, 1997. |
11. |
Community Emergency Response Team, available at:
http:// www.cert.org |
12. |
Northcutt, S., and Novak, J., "Network Intrusion
Detection: An Analyst's Handbook", 3rd edition New
Riders Publishing Thousand Oaks, CA, USA
ISBN:0735712654 |
13. |
Mell, P., and Scarfone, K., "A Complete Guide to the
Common Vulnerability Scoring System" Version 2.0
available at: www.first.org/cvss/cvss-guide.html |
14. |
Arshad, J., "Integrated Intrusion Detection and Diagnosis
for Clouds", Proceedings of Dependable Systems and
Networks (DSN), Student Forum 2009. |
15. |
Porras, P. A., Fong, M. W., and Valdes, A., "A Mission-
Impact-Based Approach to INFOSEC Alarm
Correlation", Proceedings of RAID pp. 95-114, 2002. |
16. |
Barham, P., Dragovic, B., Fraser, K., et al, "Xen and the
Art of Virtualization", Proceedings of SOSP'03, October
19-22, 2003 |
17. |
Arshad, J., Townend, P., and Xu, J., "Quantification of
Security for Compute Intensive workloads in Clouds",
Proceedings of the International Conference on Parallel
and Distributed Systems (ICPADS), 2009. |
18. |
Arshad, J., Townend, P., and Xu, J., "A Novel Intrusion
Severity Analysis Approach for Clouds", International
Journal of Future Generation Computer Systems Special
Issue for Clouds, 2011 (To be Published). |
19. |
Brackney, R., "Cyber-Intrusion Response", Proceedings
of the 17th IEEE Symposium on Reliable Distributed
Systems, West Lafayette, 1998. |
20. |
Quinlan, J.R., "C4.5: Programs for Machine Learning",
Morgan Kaufmann Publishers, 1993. |
21. |
Weka-Data Mining with Open Source Machine Learning
Software in Java. Available at: http://
www.cs.waikato.ac.nz/ml/weka/ |
22. |
Usher, A.T., "The Future of Network Intrusion
Detection", The Newsletter for Information Assurance
Technology Professionals, Volume 7, 2005. |
23. |
Somayaji, A., and Forrest, S., "Automated Response Using
System Call Delays", Proceedings of the 9th Conference
on USENIX Security Symposium, Volume 9, 2000. |
24. |
Huai, J., Li, Q., and Hu, C., "CIVIC: A Hypervisor Based
Computing Environment”, Proceedings of the
International Conference on Parallel Processing
Workshops, pp. 809-820, 2007. |
25. |
Bouzida, Y., and Cuppens, F., "Neural Networks vs.
Decision Trees for Intrusion Detection", Proceedings
of IEEE/IST Workshop on Monitoring, Attack
Detection and Mitigation (MonAM), Tuebingen,
Germany, 28-29 September 2006. |
26. |
Kang, D-K., Fuller, D., and Honavar, V., "Learning
Classifiers for Misuse and Anomaly Detection Using a
Bag of System Calls", Proceedings of the IEEE
Workshop on Information Assurance and Security, United
States Military Academy, West Point, NY, 2005. |
|
|
|