Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
Stefan BergerYangyi ChenXin HuDimitrios E. PendarakisJosyula R. RaoReiner SailerDouglas Lee SchalesMarc Ph. StoecklinPublished in: IBM J. Res. Dev. (2016)
Keyphrases
- network monitoring
- network management
- wireless sensor
- security issues
- real time
- security threats
- network administrators
- network security
- monitoring system
- network structure
- complex networks
- information security
- cloud computing environment
- security protection
- network access
- forensic analysis
- cyber attacks
- intrusion prevention
- network traffic monitoring
- wireless sensor networks
- access control
- network traffic
- situation assessment
- sensor networks
- cloud computing
- virtual private network
- network connection
- intrusion detection
- security measures
- denial of service attacks
- key management
- computer networks
- security requirements
- data center
- community structure
- cloud storage
- security problems
- virtual machine
- buffer overflow
- security policies
- morphological operators
- critical infrastructure