{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:49:41Z","timestamp":1761662981068,"version":"3.40.3"},"publisher-location":"London","reference-count":24,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9780857294388"},{"type":"electronic","value":"9780857294395"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-0-85729-439-5_11","type":"book-chapter","created":{"date-parts":[[2011,5,25]],"date-time":"2011-05-25T14:28:46Z","timestamp":1306333726000},"page":"299-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Intrusion Diagnosis Perspective on Cloud Computing"],"prefix":"10.1007","author":[{"given":"Junaid","family":"Arshad","sequence":"first","affiliation":[]},{"given":"Paul","family":"Townend","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,13]]},"reference":[{"key":"11_CR1_11","unstructured":"Amazon Elastic Computing Cloud Available at: http:\/\/www.aws.amazon.com\/ec2"},{"key":"11_CR2_11","unstructured":"Google Cloud. Available at: www.googlecloud.com"},{"key":"11_CR3_11","unstructured":"GoGrid: Scalable Load-Balanced Windows and Linux Cloud-Server Hosting. Available at: http:\/\/www.gogrid.com\/"},{"key":"11_CR4_11","unstructured":"Nimbus. Available at: www.workspace.globus.org"},{"key":"11_CR5_11","unstructured":"OpenNebula Project. http:\/\/www.opennebula.org"},{"key":"11_CR6_11","doi-asserted-by":"crossref","unstructured":"Burchard, L., M. Hovestadt, O. Kao, A. Keller, and B. Linnert: The Virtual Resource Manager: An Architecture for SLA-aware Resource Management, in the IEEE International Symposium on Cluster Computing and the Grid. 2004. p. 126\u2013133.","DOI":"10.1109\/CCGrid.2004.1336558"},{"key":"11_CR7_11","unstructured":"Tal Garfinkel, Mendel Rosenblum: When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. In the Proceedings of 10th Workshop on Hot Topics in Operating Systems, 2005 \u2013 http:\/\/www.usenix.org"},{"key":"11_CR8_11","unstructured":"Junaid Arshad, Integrated Intrusion Detection and Diagnosis for Clouds. In the proceedings of Dependable Systems and Networks (DSN), Student Forum 2009."},{"key":"11_CR9_11","doi-asserted-by":"crossref","unstructured":"John D. Strunk, Garth R. Goodson, Adam G. Pennington, Craig A. N. Soules, Gregory R. Ganger. Intrusion detection, diagnosis, and recovery with self-securing storage. Technical report CMU-CS-02-140. May 2002.","DOI":"10.21236\/ADA461216"},{"key":"11_CR10_11","doi-asserted-by":"crossref","unstructured":"Junaid Arshad, Paul Townend, Quantification of Security for Compute Intensive workloads in Clouds. Submitted to International Conference on Parallel and Distributed Systems (ICPADS) 2009.","DOI":"10.1109\/ICPADS.2009.46"},{"key":"11_CR11_11","unstructured":"Stephen Northcutt and Judy Novak; Network Intrusion Detection: An Analyst\u2019s Handbook, 3 rd edition New Riders Publishing Thousand Oaks, CA, USA ISBN:0735712654"},{"key":"11_CR12_11","unstructured":"Peter Mell and Karen Scarfone A Complete Guide to the Common Vulnerability Scoring System Version 2.0 http:\/\/www.first.org\/cvss\/cvss-guide.html"},{"key":"11_CR13_11","unstructured":"IBM Systems, Virtualization version 2, release 1 available at: publib.boulder.ibm.com\/infocenter\/eserver\/v1r2\/topic\/eicay\/eicay.pdf"},{"key":"11_CR14_11","doi-asserted-by":"crossref","unstructured":"Algirdas Avi zienis, Jean-Claude Laprie, Brian Randell and Carl Landwehr: Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE Transaction on Dependable And Secure Computing, Vol. 1, No. 1, January-March 2004.","DOI":"10.1109\/TDSC.2004.2"},{"key":"11_CR15_11","unstructured":"Rick Kazman, Mark Klein, Mario Barbacci, Tom Longstaff, Howard Lipson and Jeromy Carriere The Architecture Tradeoff Analysis Method Technical Report, CMU\/SEI-98-TR-008 ESC-TR-98-008 available at http:\/\/www.pst.ifi.lmu.de\/lehre\/WS0102\/architektur\/VL9\/ATAM.pdf"},{"key":"11_CR16_11","volume-title":"Richard Sinnott and Paul Townend; Towards Shibboleth based Security for Grids \u2013 A State-of-art Review on Grid Authentication and Authorization Technology","author":"W Jie","year":"2009","unstructured":"Wei Jie, Junaid Arshad, Richard Sinnott and Paul Townend; Towards Shibboleth based Security for Grids \u2013 A State-of-art Review on Grid Authentication and Authorization Technology. Accepted for ACM Computing Surveys. Association for Computing Machinery 2009."},{"key":"11_CR17_11","unstructured":"J. MacQueen. Some methods for classification and analysis of multivariate observations, volume 1 of Proceedings of the Fifth Berkeley Symposium on Mathematical statistics and probability, pages 281\u2013297, Berkeley, 1967. University of California Press."},{"key":"11_CR18_11","unstructured":"Quinlan, J. R. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, 1993"},{"key":"11_CR19_11","doi-asserted-by":"crossref","unstructured":"Massimo Bernaschi, Emnuele Gabrieli, Luigi V. Mancini; Remus: a security-enhanced operating system in the proceedings of ACM Transactions on Information and System Security 2002.","DOI":"10.1145\/504909.504911"},{"key":"11_CR20_11","unstructured":"The MathWorks \u2013 MATLAB and Simulink for Technical Computing. http:\/\/www.mathworks.com"},{"key":"11_CR21_11","unstructured":"Information on See5\/C5.0 www.rulequest.com\/see5-info.html"},{"key":"11_CR22_11","unstructured":"Severity Levels: http:\/\/www.internetbankingaudits.com\/severity_levels.htm"},{"key":"11_CR23_11","doi-asserted-by":"crossref","unstructured":"Jinpeng Huai, Qin Li, Chunming Hu; CIVIC: A Hypervisor based Computing Environment in the Proceedings of the 2007 International Conference on Parallel Processing Workshops.","DOI":"10.1109\/ICPPW.2007.28"},{"key":"11_CR24_11","doi-asserted-by":"crossref","unstructured":"Paul Barham_, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauery, Ian Pratt, Andrew Warfield; Xen and the Art of Virtualization in the Proceedings of SOSP\u201903, October 19.22, 2003.","DOI":"10.1145\/945445.945462"}],"container-title":["Computer Communications and Networks","Guide to e-Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-85729-439-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T20:52:35Z","timestamp":1741207955000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-0-85729-439-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9780857294388","9780857294395"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-0-85729-439-5_11","relation":{},"ISSN":["1617-7975"],"issn-type":[{"type":"print","value":"1617-7975"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"13 April 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}