Intrusion Detection in the Cloud, Dependable , Autonomic and Secure Computing DASC '09. Eighth IEEE International Conference on, pp.729-734, 2009. ,
A Virtual Machine Introspection Based Architecture for Intrusion Detection, Proceedings Network and Distributed Systems Security Symposium, pp.191-206, 2003. ,
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model, 2011 5th International Conference on Network and System Security, pp.113-120, 2011. ,
DOI : 10.1109/ICNSS.2011.6059967
SLA-Based Profit Optimization in Cloud Bursting PaaS, 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.141-150, 2014. ,
DOI : 10.1109/CCGrid.2014.78
URL : https://hal.archives-ouvertes.fr/hal-00940299
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, 2009. ,
Assessing the impact of intra-cloud live migration on anomaly detection, 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 2014. ,
DOI : 10.1109/CloudNet.2014.6968968
The vision of autonomic computing, Computer, vol.36, issue.1, pp.41-50, 2003. ,
DOI : 10.1109/MC.2003.1160055
A survey of autonomic computing???degrees, models, and applications, ACM Computing Surveys, vol.40, issue.3, pp.1-728, 2008. ,
DOI : 10.1145/1380584.1380585
Above the Clouds: A Berkeley View of Cloud Computing, 2009. ,
SP 800-145. The NIST Definition of Cloud Computing, tech. rep, 2011. ,
Beyond IaaS and PaaS: An Extended Cloud Taxonomy for Computation, Storage and Networking, 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, pp.75-82, 2013. ,
DOI : 10.1109/UCC.2013.28
OpenNebula: A Cloud Management Tool, IEEE Internet Computing, vol.15, issue.2, pp.11-14, 2011. ,
DOI : 10.1109/MIC.2011.44
OpenStack: Toward an Open-source Solution for Cloud Computing, International Journal of Computer Applications, vol.55, issue.3, pp.38-42, 2012. ,
DOI : 10.5120/8738-2991
URL : http://research.ijcaonline.org/volume55/number3/pxc3882991.pdf
KVM: the Linux Virtual Machine Monitor, Proceedings of the 2007 Ottawa Linux Symposium (OLS-07, 2007. ,
Xen and the art of virtualization, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.164-177, 2003. ,
DOI : 10.1145/1165389.945462
Memory Resource Management in VMware ESX Server, Proceedings of the 5th Symposium on Operating Systems Design and implementation- Copyright Restrictions Prevent ACM from Being Able to Make the PDFs for This Conference Available for Downloading, OSDI '02, pp.181-194, 2002. ,
DOI : 10.1145/1060289.1060307
URL : http://www.stanford.edu/class/cs240/readings/cs240-annot-esx.pdf
IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures, Computer, vol.45, issue.12, pp.65-72, 2012. ,
DOI : 10.1109/MC.2012.76
Formal requirements for virtualizable third generation architectures, Communications of the ACM, vol.17, issue.7, pp.412-421, 1974. ,
DOI : 10.1145/361011.361073
A Comparison of Software and Hardware Techniques for x86 Virtualization, Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, pp.2-13, 2006. ,
Intel virtualization technology, Computer, vol.38, issue.5, pp.48-56, 2005. ,
DOI : 10.1109/MC.2005.163
Containers and Cloud: From LXC to Docker to Kubernetes, IEEE Cloud Computing, vol.1, issue.3, pp.81-84, 2014. ,
DOI : 10.1109/MCC.2014.51
Ethane, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.1-12, 2007. ,
DOI : 10.1145/1282427.1282382
OpenFlow, ACM SIGCOMM Computer Communication Review, vol.38, issue.2, pp.69-74, 2008. ,
DOI : 10.1145/1355734.1355746
Forwarding and Control Element Separation (ForCES) Protocol Specification, 2010. ,
DOI : 10.17487/rfc5810
Protocol-oblivious forwarding, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, pp.127-132, 2013. ,
DOI : 10.1145/2491185.2491190
NOX, ACM SIGCOMM Computer Communication Review, vol.38, issue.3, pp.105-110, 2008. ,
DOI : 10.1145/1384609.1384625
FlowVisor: A Network Virtualization Layer, 2009. ,
Scalable Network Virtualization in Software-Defined Networks, IEEE Internet Computing, vol.17, issue.2, pp.20-27, 2013. ,
DOI : 10.1109/MIC.2012.144
URL : http://www.cs.princeton.edu/~jrex/papers/ieeeinternet12.pdf
Software defined environments: An introduction, IBM Journal of Research and Development, vol.58, issue.2/3, pp.1-1, 2014. ,
DOI : 10.1147/JRD.2014.2298134
Attack Class: Address Spoofing, Proceedings of the 19th National Information Systems Security Conference, pp.371-377, 1996. ,
TCP SYN flooding attacks and common mitigations, 2007. ,
DOI : 10.17487/rfc4987
URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc4987.txt.pdf
On the Effective Prevention of TLS Man-in-themiddle Attacks in Web Applications DNS flaw for cache poisoning attacks, Proceedings of the 23rd USENIX Conference on Security Symposium, pp.671-686, 2014. ,
Inside the slammer worm, IEEE Security & Privacy Magazine, vol.1, issue.4, pp.33-39, 2003. ,
DOI : 10.1109/MSECP.2003.1219056
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009. ,
DOI : 10.1145/1653662.1653687
Virtunoid: Breaking out of KVM ,
All your clouds are belong to us, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.3-14, 2011. ,
DOI : 10.1145/2046660.2046664
The Tao of Network Security Monitoring: Beyond Intrusion Detection, 2004. ,
Security Architecture for the Internet Protocol, 1998. ,
Datagram Transport Layer Security Version 1.2, RFC, vol.6347, 2012. ,
DOI : 10.17487/rfc6347
Authentication Methods for LDAP, 2000. ,
DOI : 10.17487/rfc2829
URL : http://ietfreport.isoc.org/cgi-bin/id2pdf?f1=draft-ietf-ldapext-authmeth-00.txt
The Kerberos Network Authentication Service (V5), 1993. ,
DOI : 10.17487/rfc1510
URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc1510.txt.pdf
SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS), tech. rep, 2007. ,
Intrusion Detection Systems: A Survey and Taxonomy, " tech. rep, 2000. ,
A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, vol.36, issue.1, pp.42-57, 2013. ,
DOI : 10.1016/j.jnca.2012.05.003
Anomaly-based network intrusion detection: Techniques, systems and challenges, Computers & Security, vol.28, issue.1-2, pp.18-28, 2009. ,
DOI : 10.1016/j.cose.2008.08.003
Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.2435-2463, 1999. ,
DOI : 10.1016/S1389-1286(99)00112-7
Firewalls and Internet Security: Repelling the Wily Hacker, 2003. ,
Designing Firewalls: A Survey SP 800-41 Rev. 1. Guidelines on Firewalls and Firewall Policy, tech. rep, pp.33-49, 2006. ,
DOI : 10.1002/9780470099742.ch3
HyperCheck: A Hardware-Assisted Integrity Monitor, Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection, pp.158-177, 2010. ,
DOI : 10.1007/978-3-642-15512-3_9
HyperSentry, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.38-49, 2010. ,
DOI : 10.1145/1866307.1866313
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, pp.380-395, 2010. ,
DOI : 10.1109/SP.2010.30
URL : http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND10.pdf
Copilot -a Coprocessor-based Kernel Runtime Integrity Monitor, Proceedings of the 13th Conference on USENIX Security Symposium, pp.13-13, 2004. ,
Countering kernel rootkits with lightweight hook protection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.545-554, 2009. ,
DOI : 10.1145/1653662.1653728
URL : http://discovery.csc.ncsu.edu/~pning/pubs/ccs09-HookSafe.pdf
Automatic Inference and Enforcement of Kernel Data Structure Invariants, 2008 Annual Computer Security Applications Conference (ACSAC), pp.77-86, 2008. ,
DOI : 10.1109/ACSAC.2008.29
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection, 2011 IEEE Symposium on Security and Privacy, pp.297-312, 2011. ,
DOI : 10.1109/SP.2011.11
DKSM: Subverting Virtual Machine Introspection for Fun and Profit, 2010 29th IEEE Symposium on Reliable Distributed Systems, pp.82-91, 2010. ,
DOI : 10.1109/SRDS.2010.39
URL : http://www.csc.ncsu.edu/faculty/jiang/pubs/SRDS10.pdf
Secure and Flexible Monitoring of Virtual Machines, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.385-397, 2007. ,
DOI : 10.1109/ACSAC.2007.10
https://github.com/libvmi/libvmi/releases. Accessed, p.2016 ,
Integrating a network IDS into an open source Cloud Computing environment, 2010 Sixth International Conference on Information Assurance and Security, pp.265-270, 2010. ,
DOI : 10.1109/ISIAS.2010.5604069
Intrusion Detection in Cloud Computing, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.276-283, 2013. ,
DOI : 10.1109/3PGCIC.2013.47
HyperSpector, Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments , VEE '05, pp.197-207, 2005. ,
DOI : 10.1145/1064979.1065006
Lares: An Architecture for Secure Active Monitoring Using Virtualization, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.233-247, 2008. ,
DOI : 10.1109/SP.2008.24
KvmSec, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, pp.2029-2034, 2009. ,
DOI : 10.1145/1529282.1529733
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections, pp.39-58, 2008. ,
DOI : 10.1007/978-3-540-87403-4_3
A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, pp.539-546, 2012. ,
DOI : 10.1109/UIC-ATC.2012.139
URL : http://www.csg.ci.i.u-tokyo.ac.jp/paper/kourai-atc12.pdf
VESPA, Proceedings of the 9th international conference on Autonomic computing, ICAC '12, pp.155-160, 2012. ,
DOI : 10.1145/2371536.2371564
URL : https://hal.archives-ouvertes.fr/hal-00738174
vmware.com/ NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc% 2FGUID-F11F7B52-70EB-4532-9E0E-2FCB64707A1D.html. Accessed: 2017. [133] " VMware inc. TrustPoint, p.2017 ,
SLA guarantees for cloud services, Future Generation Computer Systems, vol.54, pp.233-246, 2016. ,
DOI : 10.1016/j.future.2015.03.018
URL : https://hal.archives-ouvertes.fr/hal-01162654
Towards Self Adaptable Security Monitoring in IaaS Clouds, 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.737-740, 2015. ,
DOI : 10.1109/CCGrid.2015.133
URL : https://hal.archives-ouvertes.fr/hal-01165134
The Secure Shell: The Definitive Guide, 2001. ,
Al-safe: A secure selfadaptable application-level firewall for iaas clouds, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp.383-390, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01363540