Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS.
Amir TeshomeLouis RillingChristine MorinPublished in: NOMS (2018)
Keyphrases
- cloud computing
- service level agreements
- intrusion detection
- security issues
- intrusion prevention
- intrusion detection system
- network traffic
- network management
- resource allocation
- cloud services
- computing resources
- network security
- information security
- computer networks
- data management
- service oriented
- real time
- data center
- peer to peer
- communication networks
- virtual machine
- distributed computing
- security policies
- intelligent agents
- service providers
- data transfer
- data mining