{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T05:05:48Z","timestamp":1741496748591,"version":"3.38.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s11633-011-0584-2","type":"journal-article","created":{"date-parts":[[2011,8,11]],"date-time":"2011-08-11T14:17:06Z","timestamp":1313072226000},"page":"286-296","source":"Crossref","is-referenced-by-count":16,"title":["An automatic intrusion diagnosis approach for clouds"],"prefix":"10.1007","volume":"8","author":[{"given":"Junaid","family":"Arshad","sequence":"first","affiliation":[]},{"given":"Paul","family":"Townend","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,12]]},"reference":[{"key":"584_CR1","unstructured":"R. Subramanium. The Siamese Twins of IT Infrastructure: Grid and Virtualization, [Online], Available: http:\/\/www.ogf.org\/OGF22\/materials\/1065\/Virtualizatio n+Intel.pdf , May 28, 2011."},{"key":"584_CR2","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MC.1974.6323581","volume":"7","author":"R. P. Goldberg","year":"1974","unstructured":"R. P. Goldberg. A survey of virtual machine research. IEEE Computer, vol. 7, pp. 34\u201345, 1974.","journal-title":"IEEE Computer"},{"key":"584_CR3","unstructured":"Amazon Elastic Computing Cloud, [Online], Available: http:\/\/aws.amazon.com\/ec2\/ , May 29, 2011."},{"key":"584_CR4","unstructured":"Google Cloud, [Online], Available: http:\/\/www.google.com\/apps\/intl\/en\/business\/cloud.html , May 29, 2011."},{"key":"584_CR5","unstructured":"GoGrid: Scalable Load-balanced Windows and Linux Cloud-server Hosting, [Online], Available: http:\/\/www.gogrid.com\/ , May 29, 2011."},{"key":"584_CR6","unstructured":"Nimbus, [Online], Available: http:\/\/www.nimbusproject.org\/ , June 6, 2011."},{"key":"584_CR7","unstructured":"OpenNebula Project, [Online], Available: http:\/\/www.opennebula.org , May 29, 2011."},{"issue":"4","key":"584_CR8","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/1327512.1327513","volume":"11","author":"A. Weiss","year":"2007","unstructured":"A. Weiss. Computing in the clouds. netWorker, vol. 11, no. 4, pp. 16\u201325, 2007.","journal-title":"netWorker"},{"key":"584_CR9","first-page":"20","volume-title":"Proceedings of the 10th Conference on Hot Topics in Operating Systems","author":"T. Garfinkel","year":"2005","unstructured":"T. Garfinkel, M. Rosenblum. When virtual is harder than real: Security challenges in virtual machine based computing environments. In Proceedings of the 10th Conference on Hot Topics in Operating Systems, ACM, Berkeley, USA, vol. 10, pp. 20, 2005."},{"key":"584_CR10","unstructured":"J. Arshad. Integrated intrusion detection and diagnosis for clouds. In Proceedings of Dependable Systems and Networks (DSN), Portugal, pp. 602, 2009."},{"key":"584_CR11","doi-asserted-by":"crossref","unstructured":"L. O. Burchard, M. Hovestadt, O. Kao, A. Keller, B. Linnert. The virtual resource manager: An architecture for SLA-aware resource management. In Proceedings of IEEE International Symposium on Cluster Computing and the Grid, IEEE, pp. 126\u2013133, 2004.","DOI":"10.1109\/CCGrid.2004.1336558"},{"issue":"1\u20132","key":"584_CR12","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1504\/IJICS.2007.012248","volume":"1","author":"N. Stakhanova","year":"2007","unstructured":"N. Stakhanova, S. Basu, J. Wong. A taxonomy of intrusion response systems. International Journal of Information and Computer Security, vol. 1, no. 1\u20132, pp. 169\u2013184, 2007.","journal-title":"International Journal of Information and Computer Security"},{"key":"584_CR13","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/DISCEX.2001.932192","volume":"1","author":"D. Schnackenberg","year":"2001","unstructured":"D. Schnackenberg, H. Holliday, R. Smith, K. Djahandari, D. Sterne. Cooperative intrusion traceback and response architecture (CITRA). In Proceedings of IEEE DARPA Information Survivability Conference and Exposition, IEEE, vol. 1, pp. 56\u201368, 2001.","journal-title":"Proceedings of IEEE DARPA Information Survivability Conference and Exposition"},{"key":"584_CR14","unstructured":"P. Porras, P. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of National Information Systems Security Conference, Baltimore, Maryland, pp. 353\u2013365, 1997."},{"key":"584_CR15","unstructured":"Community Emergency Response Team, [Online], Available: http:\/\/www.cert.org , June 7, 2011."},{"key":"584_CR16","volume-title":"Network Intrusion Detection","author":"S. Northcutt","year":"2002","unstructured":"S. Northcutt, J. Novak. Network Intrusion Detection, 3rd ed., USA: Sams, 2002.","edition":"3rd ed."},{"key":"584_CR17","unstructured":"A Complete Guide to the Common Vulnerability Scoring System Version 2.0, [Online], Available: http:\/\/www.first.org\/cvss\/cvss-guide.html , May 29, 2011."},{"key":"584_CR18","doi-asserted-by":"crossref","unstructured":"P. A. Porras, M. W. Fong, A. Valdes. A mission-impactbased approach to INFOSEC alarm correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, IEEE, pp. 95\u2013114, 2002.","DOI":"10.1007\/3-540-36084-0_6"},{"key":"584_CR19","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/ICPADS.2009.46","volume-title":"Proceedings of the 15th International Conference on Parallel and Distributed Systems","author":"J. Arshad","year":"2009","unstructured":"J. Arshad, P. Townend, J. Xu. Quantification of security for compute intensive workloads in clouds. In Proceedings of the 15th International Conference on Parallel and Distributed Systems, ACM, Guangdong, PRC, pp. 479\u2013486, 2009."},{"key":"584_CR20","unstructured":"R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. Lipson, J. Carriere. The Architecture Tradeoff Analysis Method, [Online], Available: http:\/\/www.pst.ifi.lmu.de\/lehre\/WS0102\/architektur\/VL9\/ATAM.pdf , May 29, 2011."},{"key":"584_CR21","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/ICSE.1994.296768","volume-title":"Proceedings of the 16th International Conference on Software Engineering","author":"R. Kazman","year":"1994","unstructured":"R. Kazman, L. Bass, G. Abowd, M. Webb. SAAM: A method for analyzing the properties of software architectures. In Proceedings of the 16th International Conference on Software Engineering, IEEE, Sorrento, Italy, pp. 81\u201390, 1994."},{"issue":"1\u20132","key":"584_CR22","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/S0164-1212(03)00080-3","volume":"69","author":"P. Bengtsson","year":"2004","unstructured":"P. Bengtsson, N. Lassing, J. Bosch, H. V. Vliet. Architecture-level modifiability analysis. Journal of Systems and Software, vol. 69, no. 1\u20132, pp. 129\u2013147, 2004.","journal-title":"Journal of Systems and Software"},{"key":"584_CR23","doi-asserted-by":"crossref","unstructured":"A. Raza, H. Abbas. Security evaluation of software architectures using ATAM. In Proceedings of IPID ICT4D PG Symposium, Joensuu, Finland, 2008.","DOI":"10.1109\/ICICT.2009.5267185"},{"issue":"1","key":"584_CR24","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11633-007-0071-y","volume":"4","author":"D. Necsulescu","year":"2007","unstructured":"D. Necsulescu, Y. W. Jiang, B. Kim. Neural network based feedback linearization control of an unmanned aerial vehicle. International Journal of Automation and Computing, vol. 4, no. 1, pp. 71\u201379, 2007.","journal-title":"International Journal of Automation and Computing"},{"issue":"1","key":"584_CR25","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/s11633-010-0557-x","volume":"8","author":"W. G. Yi","year":"2011","unstructured":"W. G. Yi, M. Y. Lu, Z. Liu. Regression analysis of the number of association rules. International Journal of Automation and Computing, vol. 8, no. 1, pp. 78\u201382, 2011.","journal-title":"International Journal of Automation and Computing"},{"key":"584_CR26","first-page":"281","volume":"1","author":"J. MacQueen","year":"1967","unstructured":"J. MacQueen. Some methods for classification and analysis of multivariate observations. In Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, Mendeley, California, USA, vol. 1, pp. 281\u2013297, 1967.","journal-title":"Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, Mendeley, California, USA"},{"key":"584_CR27","volume-title":"C4.5: Programs for Machine Learning","author":"J. R. Quinlan","year":"1993","unstructured":"J. R. Quinlan. C4.5: Programs for Machine Learning, San Francisco, USA: Morgan Kaufmann Publishers, 1993."},{"key":"584_CR28","doi-asserted-by":"crossref","unstructured":"W. Jie, J. Arshad, R. Sinnott, P. Townend, Z. Lei. A review of grid authentication and authorization technologies and support for federated access control. ACM Computing Surveys, vol. 43, no. 2, Article No. 12, 2011.","DOI":"10.1145\/1883612.1883619"},{"issue":"1","key":"584_CR29","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"A. Avizienis, J. C. Laprie, B. Randell, C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11\u201333, 2004.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"584_CR30","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"Proceedings of the 19th ACM Symposium on Operating Systems Principles","author":"P. Barham","year":"2003","unstructured":"P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, ACM, Bolton Landing, USA, pp. 164\u2013177, 2003."},{"issue":"1","key":"584_CR31","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/504909.504911","volume":"5","author":"M. Bernaschi","year":"2002","unstructured":"M. Bernaschi, E. Gabrieli, L. V. Mancini. Remus: A security-enhanced operating system. ACM Transactions on Information and System Security, vol. 5, no. 1, pp. 36\u201361, 2002.","journal-title":"ACM Transactions on Information and System Security"},{"key":"584_CR32","unstructured":"The MathWorks \u2014 MATLAB and Simulink for Technical Computing, [Online], Available: http:\/\/www.mathworks.com , May 29, 2011."},{"key":"584_CR33","unstructured":"Information on See5\/C5.0, [Online], Available: http:\/\/www.rulequest.com\/see5-info.html , May 29, 2011."},{"key":"584_CR34","volume-title":"C4.5: Programs for Machine Learning","author":"J. R. Quinlan","year":"1993","unstructured":"J. R. Quinlan. C4.5: Programs for Machine Learning, San Francisco, USA: Morgan Kaufmann, 1993."},{"key":"584_CR35","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/IAW.2005.1495942","volume-title":"Proceedings of IEEE Workshop on Information Assurance and Security","author":"D. K. Kang","year":"2005","unstructured":"D. K. Kang, D. Fuller, V. Honavar. Learning classifiers for misuse and anomaly detection using a bag of system calls representation. In Proceedings of IEEE Workshop on Information Assurance and Security, IEEE, West Point, USA, pp. 118\u2013125, 2005."},{"key":"584_CR36","unstructured":"Severity Levels, [Online], Available: http:\/\/www.internetbankingaudits.com\/severitylevels.htm , May 29, 2011."},{"key":"584_CR37","doi-asserted-by":"crossref","unstructured":"J. Huai, Q. Li, C. Hu. CIVIC: A hypervisor based computing environment. In Proceedings of International Conference on Parallel Processing Workshops, IEEE, pp. 809\u2013820, 2007.","DOI":"10.1007\/978-3-540-75444-2_75"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-011-0584-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-011-0584-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-011-0584-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T14:38:58Z","timestamp":1741444738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-011-0584-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["584"],"URL":"https:\/\/doi.org\/10.1007\/s11633-011-0584-2","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"type":"print","value":"1476-8186"},{"type":"electronic","value":"1751-8520"}],"subject":[],"published":{"date-parts":[[2011,8]]}}}