{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:20:54Z","timestamp":1745382054471,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_33","type":"book-chapter","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T03:55:47Z","timestamp":1354247747000},"page":"441-458","source":"Crossref","is-referenced-by-count":12,"title":["Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Patel","sequence":"first","affiliation":[]},{"given":"Mona","family":"Taghavi","sequence":"additional","affiliation":[]},{"given":"Kaveh","family":"Bakhtiyari","sequence":"additional","affiliation":[]},{"given":"Joaquim Celestino","family":"J\u00fanior","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Cloud-Security-Alliance, Top Threats to Cloud Computing V1.0 (2010), https:\/\/cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf"},{"key":"33_CR2","unstructured":"Galante, J., Kharif, O., Alpeyev, P.: Sony Network Breach Shows Amazon Cloud\u2019s Appeal for Hackers (2011), http:\/\/www.bloomberg.com\/news\/2011-05-15\/sony-attack-shows-amazon-s-cloud-service-lures-hackers-at-pennies-an-hour.html"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: A comprehensive security assessment. IEEE Security & Privacy\u00a08, 35\u201344 (2010)","journal-title":"IEEE Security & Privacy"},{"key":"33_CR4","series-title":"LNBIP","first-page":"117","volume-title":"ICEIS 2008","author":"P.G. Bringas","year":"2009","unstructured":"Bringas, P.G., Penya, Y.K.: Next-Generation Misuse and Anomaly Prevention System. In: Filipe, J., Cordeiro, J. (eds.) ICEIS 2008. LNBIP, vol.\u00a019, pp. 117\u2013129. Springer, Heidelberg (2009)"},{"key":"33_CR5","doi-asserted-by":"publisher","first-page":"4349","DOI":"10.1016\/j.asoc.2010.12.004","volume":"11","author":"H.T. Elshoush","year":"2011","unstructured":"Elshoush, H.T., Osman, I.M.: Alert correlation in collaborative intelligent intrusion detection systems\u2014A survey. Applied Soft Computing\u00a011, 4349\u20134365 (2011)","journal-title":"Applied Soft Computing"},{"key":"33_CR6","unstructured":"Kl\u00fcft, S.: Alarm management for intrusion detection systems - Prioritizing and presenting alarms from intrusion detection systems. MSc Thesis, University of Gothenburg (2012), http:\/\/hdl.handle.net\/2077\/28856"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/3-540-36084-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"R. Lippmann","year":"2002","unstructured":"Lippmann, R., Webster, S., Stetson, D.: The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 307\u2013326. Springer, Heidelberg (2002)"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.inffus.2009.01.004","volume":"10","author":"F. Maggi","year":"2009","unstructured":"Maggi, F., Matteucci, M., Zanero, S.: Reducing false positives in anomaly detectors through fuzzy alert aggregation. Information Fusion\u00a010, 300\u2013311 (2009)","journal-title":"Information Fusion"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Leitner, M., Leitner, P., Zach, M., Collins, S., Fahy, C.: Fault management based on peer-to-peer paradigms; a case study report from the celtic project madeira. In: 10th IFIP\/IEEE International Symposium on Integrated Network Management, pp. 697\u2013700 (2007)","DOI":"10.1109\/INM.2007.374830"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","volume":"29","author":"C.V. Zhou","year":"2010","unstructured":"Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers & Amp; Security\u00a029, 124\u2013140 (2010)","journal-title":"Computers & Amp; Security"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Arshad, J., Townend, P., Xu, J.: A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems (2011), http:\/\/dx.doi.org\/10.1016\/j.future.2011.08.009","DOI":"10.1016\/j.future.2011.08.009"},{"key":"33_CR12","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B. Grobauer","year":"2011","unstructured":"Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Security & Privacy\u00a09, 50\u201357 (2011)","journal-title":"IEEE Security & Privacy"},{"key":"33_CR13","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MC.2009.252","volume":"42","author":"J. Viega","year":"2009","unstructured":"Viega, J.: Cloud computing and the common man. Computer\u00a042, 106\u2013108 (2009)","journal-title":"Computer"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Bakar, K.A., Tabatabaei, S.G.H.: Distributed intrusion detection in clouds using mobile agents. In: Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema, pp. 175\u2013180 (2009)","DOI":"10.1109\/ADVCOMP.2009.34"},{"key":"33_CR15","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 17th International Workshop on Quality of Service (IWQoS 2009), Charleston, SC, pp. 1\u20139 (2009)"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE 2008, Austin, TX, pp. 1\u201310 (2008)","DOI":"10.1109\/GCE.2008.4738445"},{"key":"33_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S. Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications\u00a034, 1\u201311 (2011)","journal-title":"Journal of Network and Computer Applications"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Tupakula, U., Varadharajan, V., Akku, N.: Intrusion Detection Techniques for Infrastructure as a Service Cloud. In: IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 744\u2013751 (2011)","DOI":"10.1109\/DASC.2011.128"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Gustavo, N., Miguel, C.: Anomaly-based intrusion detection in software as a service. In: Dependable Systems and Networks Workshops, pp. 19\u201324 (2011)","DOI":"10.1109\/DSNW.2011.5958858"},{"key":"33_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MITP.2009.89","volume":"12","author":"K. Vieira","year":"2010","unstructured":"Vieira, K., Schulter, A., Westphall, C.: Intrusion Detection for Grid and Cloud Computing. IT Professional\u00a012, 38\u201343 (2010)","journal-title":"IT Professional"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Xin, W., Ting-lei, H., Xiao-yu, L.: Research on the Intrusion detection mechanism based on cloud computing. In: 2010 International Conference on Intelligent Computing and Integrated Systems (ICISS), Guilin, pp. 125\u2013128 (2010)","DOI":"10.1109\/ICISS.2010.5656789"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Dhage, S., Meshram, B., Rawat, R., Padawe, S., Paingaokar, M., Misra, A.: Intrusion detection system in cloud computing environment. In: International Conference & Workshop on Emerging Trends in Technology, New York, NY, USA, pp. 235\u2013239 (2011)","DOI":"10.1145\/1980022.1980076"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Kholidy, H.A., Baiardi, F.: CIDS: A Framework for Intrusion Detection in Cloud Systems. In: Ninth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, pp. 379\u2013385 (2012)","DOI":"10.1109\/ITNG.2012.94"},{"key":"33_CR24","unstructured":"Patel, A., Qassim, Q., Shukor, Z., Nogueira, J., J\u00fanior, J., Wills, C.: Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System. In: South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, pp. 223\u2013224 (2009)"},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Smith, D., Guan, Q., Fu, S.: An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems. In: 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), Seoul, pp. 376\u2013381 (2010)","DOI":"10.1109\/COMPSACW.2010.72"},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez, C.A., Echeverri, G.I., Sanz, A.G.C.: Malware detection based on cloud computing integrating intrusion ontology representation. In: IEEE Latin-American Conference on Communications (LATINCOM), Bogota, pp. 1\u20136 (2010)","DOI":"10.1109\/LATINCOM.2010.5641013"},{"key":"33_CR27","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2007183.2007189","volume":"45","author":"F. Azmandian","year":"2011","unstructured":"Azmandian, F., Moffie, M., Alshawabkeh, M., Dy, J., Aslam, J., Kaeli, D.: Virtual machine monitor-based lightweight intrusion detection. SIGOPS Oper. Syst. Rev.\u00a045, 38\u201353 (2011)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"33_CR28","unstructured":"Lee, J.H., Park, M.W., Eom, J.H., Chung, T.M.: Multi-level Intrusion Detection System and log management in Cloud Computing. In: 13th International Conference on Advanced Communication Technology (ICACT), Seoul, pp. 552\u2013555 (2011)"},{"key":"33_CR29","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Kadobayashi, Y., Fujiwara, H.: Ontological approach toward cybersecurity in cloud computing. In: 3rd International Conference on Security of Information and Networks, Taganrog, Rostov-on-Don, Russian Federation (2010)","DOI":"10.1145\/1854099.1854121"},{"key":"33_CR30","doi-asserted-by":"crossref","unstructured":"Jin, H., Xiang, G., Zou, D., Wu, S., Zhao, F., Li, M., Zheng, W.: A VMM-based intrusion prevention system in cloud computing environment. The Journal of Supercomputing, 1\u201319 (2011)","DOI":"10.1007\/s11227-011-0608-2"},{"key":"33_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2019618.2019622","volume":"2","author":"M.M. Masud","year":"2008","unstructured":"Masud, M.M., Al-Khateeb, T.M., Hamlen, K.W., Gao, J., Khan, L., Han, J., Thuraisingham, B.: Cloud-based malware detection for evolving data streams. ACM Trans. Manage. Inf. Syst.\u00a02, 1\u201327 (2008)","journal-title":"ACM Trans. Manage. Inf. Syst."},{"key":"33_CR32","unstructured":"Zargar, S.T., Takabi, H., Joshi, J.B.D.: Dcdidp: A Distributed, Collaborative, and Data-Driven Intrusion Detection and Prevention Framework for Cloud Computing Environments. In: International Conference on Collaborative Computing: Networking, Applications and Worksharing CollaborateCom, Orlando, Florida, USA (2011)"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:18:16Z","timestamp":1745367496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}