|
1.F. Abazari, M. Analoui, H. Takab: Multi-objective response to co-resident attacks in cloud environment. Int. J. Inf. Commun. Technol. Res. 9(3), 25–36 (2018) 2.M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Information Sciences, vol. 305, pp. 357–383, 2015. 3.Shahid Anwar et al., "Response option for attacks detected by intrusion detection system," in Software Engineering and Computer Systems (ICSECS), 2015 4th International Conference on, 2015, pp. 195-200. 4.Adam Bates et al., "On detecting co-resident cloud instances using network flow watermarking techniques," International Journal of Information Security, vol. 13, pp. 171-189, 2014 5."CVE-2015-3456," Technical Report 2015 6.Farzaneh Abazari, Morteza Analoui, and Hassan Takabi, "Effect of anti-malware software on infectious nodes in cloud environment," Computers & Security, 2016. 7.Candid Wueest, "Security for Virtualization: Finding the Right Balance," Kaspersky Lab, 2012. 8.Candid Wueest, "Threats to virtual environments," Symantec, 2014. 9.Ron C Chiang, Sundaresan Rajasekaran, Nan Zhang, and H Howie Huang, "Swiper: Exploiting virtual machine vulnerability in third-party clouds with competition for I/O resources," Parallel and Distributed Systems, IEEE Transactions on, vol. 26, pp. 1732-1742, 2015 10.Venkatanathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas Ristenpart, and Michael M Swift, "Resource-freeing attacks: improve your cloud performance (at your neighbor's expense," in Proceedings of the 2012 ACM conference on Computer and communications security, 2012, pp. 281-292. 11.Wanchun Dou, Qi Chen, and Jinjun Chen, "A confidence-based filtering method for DdoS attack defense in cloud environment," Future Generation Computer Systems, vol. 29, pp. 1838-1850, 2013. 12.A. O. F. Atya, Z. Qian, S.V. Krishnamurthy, T. L. Porta, P. McDaniel, L. Marvel: Malicious co-residency on the cloud: attacks and defense. In: IEEE INFOCOM 2017 – IEEE Conference on Computer Communications, Atlanta, GA, pp. 1–9 (2017) 13.W. Zhang, X. Jia, C. Wang, S. Zhang, Q. Huang, M. Wang, P. Liu: A comprehensive study of co-residence threat in multi-tenant public PaaS clouds. In: Lam, K.Y., Chi, C.H., Qing, S. (eds.) Information and Communications Security, ICICS, Lecture Notes in Computer Science, vol. 9977. Springer, Cham (2016) 14.M. Altunay, S. Leyffer, J. T. Linderoth, Z. Xie: Optimal response to attacks on the open science grid. Comput. Netw. 55(1), 61–73 (2011) 15.F. Abazari, M. Analoui: Exploring the effects of virtual machine placement on the transmission of infections in cloud. In: 7th International Symposium on Telecommunications, Tehran, pp. 278–282 (2014) 16.Jingzheng Wu, Liping Ding, Yuqi Lin, Nasro Min-Allah, and Yongji Wang, "Xenpump: a new method to mitigate timing channel in cloud computing," in Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 2012, pp. 678--685. 17.Chun-Jen Chung, Pankaj Khatkar, Tiany Xing, Jeongkeun Lee, and Dijiang Huang, "NICE: Network intrusion detection and countermeasure selection in virtual network systems," Dependable and Secure Computing, IEEE Transactions on, 2013. 18.Swaminathan Balasubramanian, Matthew M Lobbes, Brian M O'connell, and Brian J Snitzer, "Automated Response to Detection of Threat to Cloud Virtual Machine," US Patent 20,160,094,568, March 2016. 19.Scikit-learn https://scikit-learn.org/stable/tutorial/machine_learning_map/index.html 20.Smitha and Squcciarini, Anna C Sundareswaran, "Detecting malicious co-resident virtual machines indulging in load-based attacks," Information and Communications Security, pp. 113--124, 2013.
|