Loading…
Distributed Intrusion Detection in Clouds Using Mobile Agents
Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 180 |
container_issue | |
container_start_page | 175 |
container_title | |
container_volume | |
creator | Dastjerdi, A.V. Bakar, K.A. Tabatabaei, S.G.H. |
description | Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents technology to provide intrusion detection for cloud applications regardless of their locations. Therefore, CIOs feel safer to use cloud to extend their on-premise infrastructure by adding capacity on demand. |
doi_str_mv | 10.1109/ADVCOMP.2009.34 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5359505</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5359505</ieee_id><sourcerecordid>5359505</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-9bc0c1b5503a9cc03d5021c96802ca7b6a3a1d69f4f1f409d404d36266233743</originalsourceid><addsrcrecordid>eNotjL1OwzAURo1QJejPzMDiF0i49rWdemCIEgqVWpWhsFaO7VRGIUGxM_D2FMG3nHOWj5A7BjljoB_K-r067F9zDqBzFFdkDoXSEtdcwzWZM8GFkHCpG7KK8QMuE5Ijx1vyWIeYxtBMyTu67dM4xTD0tPbJ2_RroadVN0wu0rcY-jPdD03oPC3Pvk9xSWat6aJf_XNBjpunY_WS7Q7P26rcZYEVMmW6sWBZIyWg0dYCOgmcWa3WwK0pGmXQMKd0K1rWCtBOgHCouFIcsRC4IPd_t8F7f_oaw6cZv08SpZYg8QdwCUc2</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Distributed Intrusion Detection in Clouds Using Mobile Agents</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Dastjerdi, A.V. ; Bakar, K.A. ; Tabatabaei, S.G.H.</creator><creatorcontrib>Dastjerdi, A.V. ; Bakar, K.A. ; Tabatabaei, S.G.H.</creatorcontrib><description>Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents technology to provide intrusion detection for cloud applications regardless of their locations. Therefore, CIOs feel safer to use cloud to extend their on-premise infrastructure by adding capacity on demand.</description><identifier>ISBN: 1424450829</identifier><identifier>ISBN: 9781424450824</identifier><identifier>EISBN: 0769538290</identifier><identifier>EISBN: 9780769538297</identifier><identifier>DOI: 10.1109/ADVCOMP.2009.34</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cloud computing ; Costs ; Distributed computing ; Economies of scale ; Grid computing ; Hardware ; Intrusion detection ; Intrusion Detection System ; Mobile Agent ; Mobile agents ; Scalability ; Turing machines</subject><ispartof>2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, 2009, p.175-180</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5359505$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5359505$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dastjerdi, A.V.</creatorcontrib><creatorcontrib>Bakar, K.A.</creatorcontrib><creatorcontrib>Tabatabaei, S.G.H.</creatorcontrib><title>Distributed Intrusion Detection in Clouds Using Mobile Agents</title><title>2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences</title><addtitle>ADVCOMP</addtitle><description>Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents technology to provide intrusion detection for cloud applications regardless of their locations. Therefore, CIOs feel safer to use cloud to extend their on-premise infrastructure by adding capacity on demand.</description><subject>Cloud computing</subject><subject>Costs</subject><subject>Distributed computing</subject><subject>Economies of scale</subject><subject>Grid computing</subject><subject>Hardware</subject><subject>Intrusion detection</subject><subject>Intrusion Detection System</subject><subject>Mobile Agent</subject><subject>Mobile agents</subject><subject>Scalability</subject><subject>Turing machines</subject><isbn>1424450829</isbn><isbn>9781424450824</isbn><isbn>0769538290</isbn><isbn>9780769538297</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjL1OwzAURo1QJejPzMDiF0i49rWdemCIEgqVWpWhsFaO7VRGIUGxM_D2FMG3nHOWj5A7BjljoB_K-r067F9zDqBzFFdkDoXSEtdcwzWZM8GFkHCpG7KK8QMuE5Ijx1vyWIeYxtBMyTu67dM4xTD0tPbJ2_RroadVN0wu0rcY-jPdD03oPC3Pvk9xSWat6aJf_XNBjpunY_WS7Q7P26rcZYEVMmW6sWBZIyWg0dYCOgmcWa3WwK0pGmXQMKd0K1rWCtBOgHCouFIcsRC4IPd_t8F7f_oaw6cZv08SpZYg8QdwCUc2</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Dastjerdi, A.V.</creator><creator>Bakar, K.A.</creator><creator>Tabatabaei, S.G.H.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200910</creationdate><title>Distributed Intrusion Detection in Clouds Using Mobile Agents</title><author>Dastjerdi, A.V. ; Bakar, K.A. ; Tabatabaei, S.G.H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-9bc0c1b5503a9cc03d5021c96802ca7b6a3a1d69f4f1f409d404d36266233743</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Cloud computing</topic><topic>Costs</topic><topic>Distributed computing</topic><topic>Economies of scale</topic><topic>Grid computing</topic><topic>Hardware</topic><topic>Intrusion detection</topic><topic>Intrusion Detection System</topic><topic>Mobile Agent</topic><topic>Mobile agents</topic><topic>Scalability</topic><topic>Turing machines</topic><toplevel>online_resources</toplevel><creatorcontrib>Dastjerdi, A.V.</creatorcontrib><creatorcontrib>Bakar, K.A.</creatorcontrib><creatorcontrib>Tabatabaei, S.G.H.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dastjerdi, A.V.</au><au>Bakar, K.A.</au><au>Tabatabaei, S.G.H.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Distributed Intrusion Detection in Clouds Using Mobile Agents</atitle><btitle>2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences</btitle><stitle>ADVCOMP</stitle><date>2009-10</date><risdate>2009</risdate><spage>175</spage><epage>180</epage><pages>175-180</pages><isbn>1424450829</isbn><isbn>9781424450824</isbn><eisbn>0769538290</eisbn><eisbn>9780769538297</eisbn><abstract>Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents technology to provide intrusion detection for cloud applications regardless of their locations. Therefore, CIOs feel safer to use cloud to extend their on-premise infrastructure by adding capacity on demand.</abstract><pub>IEEE</pub><doi>10.1109/ADVCOMP.2009.34</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424450829 |
ispartof | 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, 2009, p.175-180 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5359505 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Cloud computing Costs Distributed computing Economies of scale Grid computing Hardware Intrusion detection Intrusion Detection System Mobile Agent Mobile agents Scalability Turing machines |
title | Distributed Intrusion Detection in Clouds Using Mobile Agents |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T18%3A34%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Distributed%20Intrusion%20Detection%20in%20Clouds%20Using%20Mobile%20Agents&rft.btitle=2009%20Third%20International%20Conference%20on%20Advanced%20Engineering%20Computing%20and%20Applications%20in%20Sciences&rft.au=Dastjerdi,%20A.V.&rft.date=2009-10&rft.spage=175&rft.epage=180&rft.pages=175-180&rft.isbn=1424450829&rft.isbn_list=9781424450824&rft_id=info:doi/10.1109/ADVCOMP.2009.34&rft.eisbn=0769538290&rft.eisbn_list=9780769538297&rft_dat=%3Cieee_6IE%3E5359505%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-9bc0c1b5503a9cc03d5021c96802ca7b6a3a1d69f4f1f409d404d36266233743%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5359505&rfr_iscdi=true |