{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:11Z","timestamp":1750220651352,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3441885","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:09:16Z","timestamp":1619154556000},"page":"40-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SLA definition for network intrusion detection systems in IaaS clouds"],"prefix":"10.1145","author":[{"given":"Amir Teshome","family":"Wonjiga","sequence":"first","affiliation":[{"name":"Univ Rennes, Rennes, France"}]},{"given":"Louis","family":"Rilling","sequence":"additional","affiliation":[{"name":"DGA, Bruz, France"}]},{"given":"Christine","family":"Morin","sequence":"additional","affiliation":[{"name":"Inria, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"volume-title":"6th ACM CCS.","author":"Axelsson Stefan","key":"e_1_3_2_1_1_1","unstructured":"Stefan Axelsson. 1999. The base-rate fallacy and its implications for the difficulty of intrusion detection. In 6th ACM CCS."},{"volume-title":"Proc. ICISSP.","author":"Pierre-Marie","key":"e_1_3_2_1_2_1","unstructured":"Pierre-Marie Bajan et al. 2019. Methodology of a network simulation in the context of an evaluation: application to an IDS. In Proc. ICISSP."},{"key":"e_1_3_2_1_3_1","unstructured":"Richard Bejtlich. 2004. The Tao of network security monitoring: beyond intrusion detection. Pearson Education."},{"key":"e_1_3_2_1_4_1","volume-title":"Per Hakon Meland, and Astrid Undheim.","author":"Bernsmed Karin","year":"2011","unstructured":"Karin Bernsmed, Martin Gilje Jaatun, Per Hakon Meland, and Astrid Undheim. 2011. Security SLAs for federated cloud services. In IEEE ARES."},{"key":"e_1_3_2_1_5_1","volume-title":"Martin Gilje Jaatun, and Astrid Undheim","author":"Bernsmed Karin","year":"2011","unstructured":"Karin Bernsmed, Martin Gilje Jaatun, and Astrid Undheim. 2011. Security in service level agreements for cloud computing. In CLOSER."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Waleed Bul'ajoul et al. 2015. Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. System Sci. (2015).","DOI":"10.1016\/j.jcss.2014.12.012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Valentina Casola et al. 2017. Automatically enforcing security SLAs in the cloud. IEEE TSC (2017).","DOI":"10.1109\/TSC.2016.2540630"},{"key":"e_1_3_2_1_8_1","volume-title":"Alessandra De Benedictis, and Massimiliano Rak","author":"Casola Valentina","year":"2015","unstructured":"Valentina Casola, Alessandra De Benedictis, and Massimiliano Rak. 2015. Security monitoring in the cloud: an SLA-based approach. In IEEE ARES."},{"key":"e_1_3_2_1_9_1","volume-title":"Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/ accessed","author":"CVE","year":"2020","unstructured":"CVE 2020. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/ accessed July 2020."},{"volume-title":"An approach to security-SLA in cloud computing environment","author":"Da Silva Carlos Alberto","key":"e_1_3_2_1_10_1","unstructured":"Carlos Alberto Da Silva and Paulo Licio de Geus. 2014. An approach to security-SLA in cloud computing environment. In IEEE LATINCOM."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Guofei Gu et al. 2006. Measuring intrusion detection capability: an information-theoretic approach. In ACM ASIACCS.","DOI":"10.1145\/1128817.1128834"},{"volume-title":"47th HICSS. 4895--4904.","author":"Holm Hannes","key":"e_1_3_2_1_12_1","unstructured":"Hannes Holm. 2014. Signature based intrusion detection for zero-day attacks:(not) a closed chapter?. In 47th HICSS. 4895--4904."},{"volume-title":"Security SLA based monitoring in clouds","author":"Kaaniche Nesrine","key":"e_1_3_2_1_13_1","unstructured":"Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, and Heiko Ludwig. 2017. Security SLA based monitoring in clouds. In IEEE EDGE."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Yousri Kouki and Thomas Ledoux. 2012. CSLA: a Language for improving Cloud SLA Management. In CLOSER. 586--591.","DOI":"10.5220\/0003956405860591"},{"key":"e_1_3_2_1_15_1","volume-title":"Open source software for creating private and public clouds. https:\/\/www.openstack.org\/ accessed","author":"Openstack","year":"2020","unstructured":"Openstack 2020. Open source software for creating private and public clouds. https:\/\/www.openstack.org\/ accessed July 2020."},{"key":"e_1_3_2_1_16_1","volume-title":"Open vSwitch is a production quality, multilayer virtual switch. https:\/\/www.openvswitch.org\/ accessed","author":"OVS","year":"2020","unstructured":"OVS 2020. Open vSwitch is a production quality, multilayer virtual switch. https:\/\/www.openvswitch.org\/ accessed July 2020."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Dana Petcu and Ciprian Craciun. 2014. Towards a Security SLA-based Cloud Monitoring Service.. In CLOSER. 598--603.","DOI":"10.5220\/0004957305980603"},{"volume-title":"Proc. EDCC.","author":"Thibaut","key":"e_1_3_2_1_18_1","unstructured":"Thibaut Probst et al. 2015. Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. In Proc. EDCC."},{"key":"e_1_3_2_1_19_1","volume-title":"A quality metric for IDS signatures: in the wild the size matters. EURASIP","author":"Raftopoulos Elias","year":"2013","unstructured":"Elias Raftopoulos and Xenofontas Dimitropoulos. 2013. A quality metric for IDS signatures: in the wild the size matters. EURASIP (2013)."},{"key":"e_1_3_2_1_20_1","unstructured":"Massimiliano Rak et al. 2013. Security as a service using an SLA-based approach via SPECS. In CloudCom."},{"key":"e_1_3_2_1_21_1","volume-title":"An open source intrusion detection and prevention system. https:\/\/www.snort.org\/ accessed","author":"Snort","year":"2020","unstructured":"Snort 2020. An open source intrusion detection and prevention system. https:\/\/www.snort.org\/ accessed July 2020."},{"volume-title":"Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS","author":"Teshome Amir","key":"e_1_3_2_1_22_1","unstructured":"Amir Teshome, Louis Rilling, and Christine Morin. 2018. Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS. In NOMS IEEE\/IFIP."}],"event":{"name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event Republic of Korea","acronym":"SAC '21"},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441885","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3441885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:22Z","timestamp":1750197742000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":22,"alternative-id":["10.1145\/3412841.3441885","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3441885","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}