SaaS-driven botnets
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jiang, Biao | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.contributor.author | Koo, Yunmo | - |
dc.date.accessioned | 2022-07-16T15:27:48Z | - |
dc.date.available | 2022-07-16T15:27:48Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2012-05 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/165650 | - |
dc.description.abstract | Cloud computing is one of the most emerging technologies in these years. According to the service models, it can be categorized into SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). Because SaaS uses computational power from both servers of cloud computing providers and machines of customers, we argue that SaaS may be elaborately exploited in an unprecedented way as an attack vector for botnets, i.e. SaaS-driven botnets. This paper introduces SaaS-driven botnets with detailed analysis on feasibilities, and proposes potential defense approaches against SaaS-driven botnets. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.title | SaaS-driven botnets | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1007/978-3-642-30428-6_17 | - |
dc.identifier.scopusid | 2-s2.0-84862171091 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.7299 LNCS, pp.198 - 206 | - |
dc.relation.isPartOf | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 7299 LNCS | - |
dc.citation.startPage | 198 | - |
dc.citation.endPage | 206 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Attack vector | - |
dc.subject.keywordPlus | botnet | - |
dc.subject.keywordPlus | Botnets | - |
dc.subject.keywordPlus | Computational power | - |
dc.subject.keywordPlus | Emerging technologies | - |
dc.subject.keywordPlus | SaaS | - |
dc.subject.keywordPlus | Service Model | - |
dc.subject.keywordPlus | Software as a service | - |
dc.subject.keywordPlus | Information science | - |
dc.subject.keywordPlus | Cloud computing | - |
dc.subject.keywordAuthor | botnet | - |
dc.subject.keywordAuthor | cloud computing | - |
dc.subject.keywordAuthor | SaaS | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-642-30428-6_17 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.