{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:40:03Z","timestamp":1745948403662,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336140"},{"type":"electronic","value":"9783642336157"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33615-7_12","type":"book-chapter","created":{"date-parts":[[2013,1,15]],"date-time":"2013-01-15T14:30:32Z","timestamp":1358260232000},"page":"628-644","source":"Crossref","is-referenced-by-count":13,"title":["mOSAIC-Based Intrusion Detection Framework for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Ficco","sequence":"first","affiliation":[]},{"given":"Salvatore","family":"Venticinque","sequence":"additional","affiliation":[]},{"given":"Beniamino","family":"Di Martino","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Westphall, C.B., Lamin, F.R.: SLA Perspective in Security Management for Cloud Computing. In: Proc. of the Int. Conf. on Networking and Services (ICNS), pp. 212\u2013217 (2010)","DOI":"10.1109\/ICNS.2010.36"},{"key":"12_CR2","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-642-30436-1_52","volume-title":"Information Security and Privacy Research","author":"M. Ficco","year":"2012","unstructured":"Ficco, M., Rak, M.: Intrusion Tolerance of Stealth DoS Attacks to Web Services. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol.\u00a0376, pp. 579\u2013584. Springer, Heidelberg (2012)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Kossmann, D., Loesing, S.: An evaluation of alternative architectures for transaction processing in the cloud. In: Proc. of the Int. Conf. on Manag. of Data (2010)","DOI":"10.1145\/1807167.1807231"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Emeakaroha, V.C., Maurer, M., Dustdar, S., Acs, S., Kertesz, A., Kecskemeti, G.: LAYSI: A Layered Approach for SLA-Violation Propagation in Self-manageble Cloud Infrastructures. In: Proc. of the IEEE 34th Conf. on Computer Software and Applications, pp. 365\u2013370 (November 2010)","DOI":"10.1109\/COMPSACW.2010.70"},{"key":"12_CR5","unstructured":"Ostermann, S., Iosup, A., Yigitbasi, N., Prodan, R., Fahringer, T., Epema, D.: An Early Performance Analysis of Cloud Computing Services for Scientific Computing. TU Delft\/PDS Technical Report PDS-2008-12 (December 2008)"},{"key":"12_CR6","unstructured":"Barbosa, P.R., Righi, R.R., Kreutz, D.L.: Defining Metrics to Sec-SLA Agreements in Conformance to International Security Standards. In: Proc. of the 23rd Latin American Informatics Conference, pp. 36\u201347 (2007)"},{"key":"12_CR7","unstructured":"Righi, R.R., Pelissari, F.R., Westphall, C.B.: Sec-SLA: Specification and Validation of Metrics to Security Service Level Agreements. In: Proc. of the Computer System Security Workshop, pp. 199\u2013210 (2004)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Ficco, M., Romano, L.: A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing. In: Proc. of the 1st International Conference on Data Compression, Communications and Processing, pp. 275\u2013284. IEEE CS Press (June 2011)","DOI":"10.1109\/CCP.2011.43"},{"key":"12_CR9","first-page":"71","volume":"34","author":"I. Gul","year":"2011","unstructured":"Gul, I., Hussain, M.: Distributed Cloud Intrusion Detection Model. Int. Journal of Advanced Science and Technology\u00a034, 71\u201382 (2011)","journal-title":"Int. Journal of Advanced Science and Technology"},{"key":"12_CR10","unstructured":"mOSAIC Project, mOSAIC: Open source API and platform for multiple Clouds (May 2012), http:\/\/www.mosaic-cloud.eu"},{"key":"12_CR11","unstructured":"Amazon Elastic Compute Cloud (Amazon EC2), Amazon (April 2012), http:\/\/aws.amazon.com\/ec2\/"},{"key":"12_CR12","unstructured":"Windows Azure Platform, Microsoft Corporation (April 2012), http:\/\/www.microsoft.com\/azure\/"},{"key":"12_CR13","unstructured":"Google App. Engine, Google (April 2012), http:\/\/code.google.com\/appengine\/"},{"key":"12_CR14","unstructured":"Curry, D., Debar, H.: Intrusion Detection Message Exchange Format: Extensible Markup Language (XML) Document Type Definition, draft-ietf-idwg-idmef-xml-10.txt (January 2003)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Ramgovind, S., Eloff, M., Smith, E.: The Management of Security in Cloud Computing. In: Proc. of the Int. Conf. on Information Security for South Africa (2010)","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"12_CR16","unstructured":"Schulter, K.: Intrusion Detection for Grid and Cloud Computing. IEEE IT Professional Journal (July 2010)"},{"key":"12_CR17","unstructured":"Bhadauria, R., Chaki, R., Chaki, N., Sanyal, S.: A Survey on Security Issues in Cloud Computing (September 2011), http:\/\/arxiv.org\/abs\/1109.5388"},{"issue":"8","key":"12_CR18","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1016\/j.future.2010.02.003","volume":"26","author":"F. Palmieri","year":"2010","unstructured":"Palmieri, F., Pardi, S.: Towards a federated Metropolitan Area Grid environment: The SCoPE network-aware infrastructure. Future Generation Computer Systems\u00a026(8), 1241\u20131256 (2010)","journal-title":"Future Generation Computer Systems"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and Privacy in Cloud Computing: A Survey. In: Proc. of the the 6th Int. Conf. on Semantics Knowledge and Grid, pp. 105\u2013112 (November 2010)","DOI":"10.1109\/SKG.2010.19"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. In: Proc. of the IEEE Int. Conf. on Dependable, Autonomic and Secure Computing, pp. 729\u2013734 (December 2009)","DOI":"10.1109\/DASC.2009.94"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Lo, C.-C., Huang, C.-C., Ku, J.: A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. In: Proc. of the 39th Int. Conf. on Parallel Processing, pp. 280\u2013284. IEEE CS Press (September 2010)","DOI":"10.1109\/ICPPW.2010.46"},{"key":"12_CR22","unstructured":"Park, M.-W., Eom, J.-H.: Multi-level Intrusion Detection System and Log Management in Cloud Computin. In: Proc. of the 13th Int. Conf. on Advanced Communication Technology, pp. 552\u2013555. IEEE CS Press (February 2011)"},{"key":"12_CR23","unstructured":"Ficco, M., Rak, M.: Intrusion Tolerance as a Service: A SLA-Based Solution. In: Proc. of the 2nd Int. Conf. on Cloud Computing and Services Science. IEEE CS Press (April 2012)"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Ficco, M., Rak, M.: Intrusion Tolerance in Cloud Applications: the mOSAIC Approach. In: Proc. of the 6th Int. Conf. on Complex, Intelligent, and Software Intensive Systems (2012)","DOI":"10.1109\/CISIS.2012.202"},{"key":"12_CR25","unstructured":"Amqp - Advanced message queuing protocol (April 2012), http:\/\/www.amqp.org\/"},{"key":"12_CR26","unstructured":"Amazon Web Services LLC - Amazon simple queue service (amazon sqs) (April 14, 2012), http:\/\/aws.amazon.com\/sqs\/"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Rak, M., Venticinque, S., Mhr, T., Echevarria, G., Esnal, G.: Cloud application monitoring: The mosaic approach. In: Proc. of the IEEE Int. Conf. on Cloud Computing Technology and Science, pp. 758\u2013763 (2011)","DOI":"10.1109\/CloudCom.2011.117"},{"key":"12_CR28","unstructured":"mOSAIC Consortium. mOSAIC source repository (April 14, 2012), https:\/\/bitbucket.org\/mosaic"},{"key":"12_CR29","unstructured":"Prelude, an Hybrid Intrusion Detection System (February-April 2012), http:\/\/www.prelude-technologies.com\/en\/welcome\/index.html"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33615-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:14:19Z","timestamp":1745946859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33615-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336140","9783642336157"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33615-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}