Basit öğe kaydını göster

dc.contributor.authorOktay, Ucman
dc.contributor.authorAydin, Muhammed Ali
dc.contributor.authorSahingoz, Ozgur Koray
dc.date.accessioned2021-03-03T17:49:50Z
dc.date.available2021-03-03T17:49:50Z
dc.identifier.citationOktay U., Aydin M. A. , Sahingoz O. K. , "A Circular Chain Intrusion Detection for Cloud Computing based on improved AdjointVM Approach", 14th IEEE International Symposium on Computational Intelligence and Informatics (CINTI), Budapest, Macaristan, 19 - 21 Kasım 2013, ss.201-206
dc.identifier.othervv_1032021
dc.identifier.otherav_4bb27de1-9bc9-4fa5-8f4e-a6a1d6915b83
dc.identifier.urihttp://hdl.handle.net/20.500.12627/54313
dc.identifier.urihttps://doi.org/10.1109/cinti.2013.6705192
dc.description.abstractCloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).
dc.language.isoeng
dc.subjectBilgi Sistemleri, Haberleşme ve Kontrol Mühendisliği
dc.subjectSinyal İşleme
dc.subjectBilgisayar Bilimleri
dc.subjectAlgoritmalar
dc.subjectBiyoenformatik
dc.subjectMühendislik ve Teknoloji
dc.subjectMÜHENDİSLİK, ELEKTRİK VE ELEKTRONİK
dc.subjectMühendislik
dc.subjectBİLGİSAYAR BİLİMİ, TEORİ VE YÖNTEM
dc.subjectMühendislik, Bilişim ve Teknoloji (ENG)
dc.subjectBilgisayar Bilimi
dc.subjectBİLGİSAYAR BİLİMİ, YAPAY ZEKA
dc.titleA Circular Chain Intrusion Detection for Cloud Computing based on improved AdjointVM Approach
dc.typeBildiri
dc.contributor.departmentTurkish Air Force , ,
dc.contributor.firstauthorID141081


Bu öğenin dosyaları:

DosyalarBoyutBiçimGöster

Bu öğe ile ilişkili dosya yok.

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster