The nist definition of cloud computing, National Institute of Standards & Technology (NIST), 2009. ,
Intrusion detection in the cloud. Dependable, Autonomic and Secure Computing, IEEE International Symposium on 0, pp.729-734, 2009. ,
Anomaly-based network intrusion detection: Techniques, systems and challenges, Computers & Security, vol.28, issue.1-2, pp.18-28, 2009. ,
DOI : 10.1016/j.cose.2008.08.003
A short survey of intrusion detection systems, Problems of Engineering Cybernetics and Robotics, 2007. ,
Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.300-302, 2009. ,
DOI : 10.1109/ISI.2009.5137329
Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine, 2010 Second International Conference on Communication Software and Networks, pp.260-264, 2010. ,
DOI : 10.1109/ICCSN.2010.56
Integrating a network IDS into an open source Cloud Computing environment, 2010 Sixth International Conference on Information Assurance and Security, pp.265-270, 2010. ,
DOI : 10.1109/ISIAS.2010.5604069
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.6554
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks, 2010 39th International Conference on Parallel Processing Workshops, pp.280-284, 2010. ,
DOI : 10.1109/ICPPW.2010.46
Intrusion Detection for Grid and Cloud Computing, IT Professional, vol.12, issue.4, pp.38-43, 2010. ,
DOI : 10.1109/MITP.2009.89
Snort, network intrusion detection and prevention system ,
The Eucalyptus Open-Source Cloud-Computing System, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, pp.124-131, 2009. ,
DOI : 10.1109/CCGRID.2009.93
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.2753
A technical report on an elastic utility computing architecture linking your programs to useful systems, 2008. ,
Honeypots, Proceedings of the 45th annual southeast regional conference on , ACM-SE 45, pp.321-326, 2007. ,
DOI : 10.1145/1233341.1233399