A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing.
Adrian J. DuncanSadie CreeseMichael GoldsmithPublished in: Cyber Security (2019)
Keyphrases
- attack detection
- cloud computing
- multistage
- intrusion detection system
- computing resources
- data center
- cloud computing environment
- attack scenarios
- data management
- service providers
- distributed computing
- business models
- cyber attacks
- security issues
- product recommendation
- insider threat
- cloud computing platform
- database
- intrusion detection
- cloud services
- cost effective