Detecting Security Attacks in Trusted Virtual Domains.
Udaya Kiran TupakulaVijay VaradharajanPublished in: EUC (2010)
Keyphrases
- security threats
- security mechanisms
- malicious activities
- security problems
- network connection
- computer security
- cyber attacks
- security measures
- intrusion detection
- network intrusion detection systems
- trusted computing
- security protocols
- java card
- fault injection
- denial of service attacks
- security vulnerabilities
- countermeasures
- malicious attacks
- security risks
- security issues
- stream cipher
- malicious users
- security breaches
- identity theft
- biometric template
- secure routing
- security flaws
- chosen plaintext
- access control
- intrusion prevention
- virtual environment
- detecting malicious
- intrusion detection system
- cryptographic algorithms
- cryptographic protocols
- smart card
- information security
- network security
- security requirements
- trust relationships
- security management
- anomaly detection
- security policies
- dos attacks
- misuse detection
- attack scenarios
- resource constrained
- advanced encryption standard
- insider attacks
- cyber security
- key management
- critical infrastructure
- detect malicious
- cloud computing
- intrusion detection and prevention
- watermarking scheme