{"id":"https://openalex.org/W2529029474","doi":"https://doi.org/10.1109/dasc-picom-datacom-cyberscitec.2016.159","title":"A Distributed and Autonomous Guard System Based on Cloud Environments","display_name":"A Distributed and Autonomous Guard System Based on Cloud Environments","publication_year":2016,"publication_date":"2016-08-01","ids":{"openalex":"https://openalex.org/W2529029474","doi":"https://doi.org/10.1109/dasc-picom-datacom-cyberscitec.2016.159","mag":"2529029474"},"language":"en","primary_location":{"id":"doi:10.1109/dasc-picom-datacom-cyberscitec.2016.159","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc-picom-datacom-cyberscitec.2016.159","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030040298","display_name":"Wei-Fa Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Wei-Fa Liao","raw_affiliation_strings":["Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076813053","display_name":"Hung\u2013Min Sun","orcid":"https://orcid.org/0000-0003-0870-9973"},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hung-Min Sun","raw_affiliation_strings":["Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004214379","display_name":"Wei Wu","orcid":"https://orcid.org/0000-0003-1424-1414"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wu","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030040298"],"corresponding_institution_ids":["https://openalex.org/I25846049"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12395894,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"917","last_page":"920"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7776377201080322},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7739776968955994},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6281225085258484},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.5959450006484985},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.531823456287384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5172877311706543},{"id":"https://openalex.org/keywords/system-administrator","display_name":"System administrator","score":0.5026504993438721},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4842917323112488},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46570640802383423},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.4510584771633148},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42851948738098145},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42792055010795593},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4176805913448334},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25103577971458435}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7776377201080322},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7739776968955994},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6281225085258484},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.5959450006484985},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.531823456287384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5172877311706543},{"id":"https://openalex.org/C2780814629","wikidata":"https://www.wikidata.org/wiki/Q327353","display_name":"System administrator","level":2,"score":0.5026504993438721},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4842917323112488},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46570640802383423},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.4510584771633148},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42851948738098145},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42792055010795593},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4176805913448334},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25103577971458435},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dasc-picom-datacom-cyberscitec.2016.159","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc-picom-datacom-cyberscitec.2016.159","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2147118406","https://openalex.org/W3105162108"],"related_works":["https://openalex.org/W4254637722","https://openalex.org/W2980401999","https://openalex.org/W3016483420","https://openalex.org/W2331628363","https://openalex.org/W2393030234","https://openalex.org/W2468386885","https://openalex.org/W1981261802","https://openalex.org/W2133389611","https://openalex.org/W2545245845","https://openalex.org/W3128428864"],"abstract_inverted_index":{"In":[0,67,86,106],"recent":[1],"years,":[2],"Cloud":[3,18],"computing":[4],"has":[5],"become":[6],"increasingly":[7],"popular.":[8],"Many":[9],"companies":[10],"have":[11],"replaced":[12],"traditional":[13,46],"hosting":[14],"to":[15,69,77,119,123,147],"cloud":[16],"hosting.":[17],"providers":[19],"are":[20],"responsible":[21],"for":[22,95,103],"tenant":[23,27],"isolation,":[24],"if":[25],"a":[26,73,91,128,143],"(virtual":[28,65],"machine)":[29],"is":[30,42],"infected,":[31],"other":[32],"tenants":[33],"will":[34],"be":[35],"affected.":[36],"Because":[37],"the":[38,45,62,79,82,125,133,149,156,159,180],"virtual":[39],"network":[40],"environment":[41],"very":[43],"complex,":[44],"intrusion":[47,83,96],"detection":[48,84],"systems":[49],"can":[50,58,177],"only":[51],"detect":[52,61],"attacks":[53],"from":[54,72,112],"external":[55],"networks,":[56],"but":[57],"not":[59],"effectively":[60,178],"internal":[63],"traffic":[64],"network).":[66],"order":[68],"full":[70],"defend":[71],"threat,":[74],"we":[75,89,140,154],"need":[76],"redesign":[78],"architecture":[80,94],"of":[81,127,158],"system.":[85,165],"this":[87],"thesis,":[88],"propose":[90],"flexible":[92],"distributed":[93],"detection,":[97],"and":[98,115,175],"uses":[99],"software-defined":[100],"networking":[101],"technology":[102],"defensive":[104],"purposes.":[105],"addition,":[107],"our":[108,170],"system":[109,161,171],"collects":[110],"alerts":[111],"different":[113],"nodes,":[114],"analyzes":[116],"their":[117],"correlation":[118],"generate":[120],"security":[121],"rules":[122],"achieve":[124],"effect":[126],"joint":[129],"defense.":[130],"To":[131],"make":[132],"administrator":[134],"more":[135],"effective":[136],"in":[137],"management":[138,145],"purposes,":[139],"also":[141],"provide":[142],"web-based":[144],"center":[146],"reduce":[148],"burden":[150],"on":[151],"administrators.":[152],"Finally,":[153],"analyze":[155],"performance":[157],"proposed":[160],"with":[162],"an":[163],"original":[164],"The":[166],"results":[167],"show":[168],"that":[169],"adds":[172],"slightly":[173],"overhead,":[174],"it":[176],"block":[179],"malicious":[181],"flow.":[182]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
