Intrusion Detection for Grid and Cloud Computing

作者: Kleber Vieira , Alexandre Schulter , Carlos Becker Westphall , Carla Merkle Westphall

DOI: 10.1109/MITP.2009.89

关键词:

摘要: Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality data transmission. The Grid Cloud Computing Intrusion Detection System integrates knowledge behavior analysis to detect intrusions.

参考文章(9)
Stuart Kenny, Brian Coghlan, Towards a Grid-wide Intrusion Detection System Advances in Grid Computing - EGC 2005. pp. 275- 284 ,(2005) , 10.1007/11508380_29
Hervé Debar, Marc Dacier, Andreas Wespi, Towards a taxonomy of intrusion-detection systems Computer Networks. ,vol. 31, pp. 805- 822 ,(1999) , 10.1016/S1389-1286(98)00017-6
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Junyang Li, GHIDS: Defending Computational Grids against Misusing of Shared Resources asia-pacific services computing conference. pp. 526- 533 ,(2006) , 10.1109/APSCC.2006.60
N.B. Idris, B. Shanmugam, Artificial Intelligence Techniques Applied to Intrusion Detection ieee india conference. pp. 52- 55 ,(2005) , 10.1109/INDCON.2005.1590122
Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih, Integrating grid with intrusion detection advanced information networking and applications. ,vol. 1, pp. 304- 309 ,(2005) , 10.1109/AINA.2005.221
Hans A. Franke, Fernando L. Koch, Carlos O. Rolim, Carlos B. Westphall, Douglas O. Balen, Grid-M: Middleware to Integrate Mobile Devices, Sensors and Grid Computing international conference on wireless and mobile communications. pp. 19- 19 ,(2007) , 10.1109/ICWMC.2007.43
Alexandre Schulter, Kleber Vieira, Carlos Westphall, Carla Westphall, Sekkaki Abderrahim, None, Intrusion Detection for Computational Grids new technologies, mobility and security. pp. 1- 5 ,(2008) , 10.1109/NTMS.2008.ECP.54
Paulo Fernando da Silva, Carlos Becker Westphall, Improvements in the model for interoperability of intrusion detection responses compatible with the IDWG model International Journal of Network Management. ,vol. 17, pp. 287- 294 ,(2007) , 10.1002/NEM.626
Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke, A security architecture for computational grids computer and communications security. pp. 83- 92 ,(1998) , 10.1145/288090.288111