A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Junwon | - |
dc.contributor.author | Cho, Jaeik | - |
dc.contributor.author | Seo, Jungtaek | - |
dc.contributor.author | Shon, Taeshik | - |
dc.contributor.author | Won, Dongho | - |
dc.date.accessioned | 2021-09-15T04:40:43Z | - |
dc.date.available | 2021-09-15T04:40:43Z | - |
dc.date.created | 2021-09-15 | - |
dc.date.issued | 2013-02 | - |
dc.identifier.issn | 1383-469X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/82140 | - |
dc.description.abstract | Recent developments have caused the expansion of various cloud computing environments and services. Cloud computing environments have led to research in the areas of data processing, virtual environments, and access control. Information security is the most important research area for these environments security. In this study, we analyzed typical example of network testbeds, which have been used for malicious activity data collection and its subsequent analysis. Further, we propose an effective malicious network application testbed, which is based on a cloud system. We also verified the performance of our new testbed by comparing real malicious activity with the cloud-based testbed results. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.relation.isPartOf | MOBILE NETWORKS & APPLICATIONS | - |
dc.title | A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000313800500011 | - |
dc.identifier.doi | 10.1007/s11036-012-0375-1 | - |
dc.identifier.bibliographicCitation | MOBILE NETWORKS & APPLICATIONS, v.18, no.1, pp.122 - 128 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-84878522474 | - |
dc.citation.endPage | 128 | - |
dc.citation.startPage | 122 | - |
dc.citation.title | MOBILE NETWORKS & APPLICATIONS | - |
dc.citation.volume | 18 | - |
dc.citation.number | 1 | - |
dc.contributor.affiliatedAuthor | Seo, Jungtaek | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | mobile cloud | - |
dc.subject.keywordAuthor | cloud test bed | - |
dc.subject.keywordAuthor | cloud network anomaly | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.