A Study on Cloud Computing for Detecting Cyber Attacks |
Lee, Jun-Won
(Division of Computer Engineering, Sungkyunkwan University)
Cho, Jae-Ik (Samsung Electronics) Lee, Seok-Jun (Division of Computer Engineering, Ajou University) Won, Dong-Ho (Division of Computer Engineering, Sungkyunkwan University) |
1 | Wayne A. Jansen, "Cloud Hooks: Security and Privacy Issues in Cloud Computing", 44th Hawaii International Conference on System Sciences 2011. |
2 | W. Jansen, and T. Grance, "Guidelines on Security and Privacy in Public Cloud Computing", January, 2011 |
3 | SungKyong Eun, "Cloud Computing Security Technology", No.20-2, Review of KIISC, 2010. |
4 | Taehyung Kim, Inhyun Kim, Changwoo Min, Yeongik Eom, "The Trends of Cloud Computing Security Technology", No.30-1, Communications of the Korea Information Science Society, 2012. |
5 | Korea Communicaions Commission, MOSPA, MOTIE, 2011 National Information Security White Paper, p.305, 2011. |
6 | Boan News, "Enhancing the security of SNS is what we need to do", http://www.boannews.com/media/view.asp?idx=22775, Sep 2010. |
7 | Trend Micro 2011 Security News, http://kr.trendmicro.com/kr/about/events/eventcalendar/event/20110803045254.html, Aug 2011. |
8 | ITL-SANS KOREA, "Summary of Intelligent Persistence Hacking APT attack", May 2011. |
9 | Ahnlab Web Document, "[Special Report] Revealed APT attack secrets", Oct 2011. |
10 | Wenke Lee, Salvatore J. Stolfo, "A framework for constructing features and models for intrusion detection systems", ACM Trans. Inf. Syst. Secur. 3, 2000 |