Protecting host-based intrusion detectors through virtual machines.
Marcos LaureanoCarlos MazieroEdgard JamhourPublished in: Comput. Networks (2007)
Keyphrases
- virtual machine
- operating system
- intrusion detection
- intrusion detection system
- object detection
- data center
- distributed computing
- computing resources
- network security
- cloud computing environment
- low latency
- anomaly detection
- multi tasking
- optimal allocation
- low cost
- java card
- cloud computing
- application level
- java virtual machine
- data sets
- real time