Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.

IBM Journal of Research and Development(2016)

引用 2|浏览105
暂无评分
摘要
Cloud computing has not only become attractive for organizations and end-users but also for attackers that use cloud environments to exploit the offered economies of scale—a cloud environment consists of a large set of systems with an excellent network connectivity setup and similar configurations. In this paper, we propose a comprehensive approach towards monitoring cloud computing environments b...
更多
查看译文
关键词
Monitoring,Cloud computing,Computer security,Passive networks,Malware,Virtual machining,IP networks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要