Evaluation of intrusion detection systems in virtualized environments: = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Würzburg
2016
|
Schlagworte: | |
Online-Zugang: | Volltext http://d-nb.info/1122436068/34 Inhaltsverzeichnis |
Beschreibung: | xx, 201 Seiten Diagramme |
Format: | Langzeitarchivierung gewährleistet, LZA |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV044012723 | ||
003 | DE-604 | ||
005 | 20170927 | ||
007 | t | ||
008 | 170125s2016 gw |||| m||| 00||| eng d | ||
015 | |a 17,O01 |2 dnb | ||
016 | 7 | |a 1122436068 |2 DE-101 | |
035 | |a (OCoLC)967725604 | ||
035 | |a (DE-599)DNB1122436068 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BY | ||
049 | |a DE-384 |a DE-473 |a DE-703 |a DE-1051 |a DE-824 |a DE-29 |a DE-12 |a DE-91 |a DE-19 |a DE-1049 |a DE-92 |a DE-739 |a DE-898 |a DE-355 |a DE-706 |a DE-20 |a DE-1102 |a DE-860 |a DE-2174 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Milenkoski, Aleksandar |e Verfasser |0 (DE-588)1124098542 |4 aut | |
245 | 1 | 0 | |a Evaluation of intrusion detection systems in virtualized environments |b = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen |c Aleksandar Milenkoski ; Gutachter: Prof. Dr. Samuel Kounev, Prof. Dr. Felix Freiling, Prof. Dr. Michael Meier |
246 | 1 | 1 | |a Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen |
264 | 1 | |a Würzburg |c 2016 | |
300 | |a xx, 201 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Julius-Maximilians-Universität Würzburg |d 2016 | ||
538 | |a Langzeitarchivierung gewährleistet, LZA | ||
546 | |a Zusammenfassung in deutscher und englischer Sprache | ||
650 | 0 | 7 | |a Evaluation |0 (DE-588)4071034-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Virtuelles Netz |0 (DE-588)4807205-9 |2 gnd |9 rswk-swf |
653 | |a intrusion detection | ||
653 | |a evaluation | ||
653 | |a virtualized environments | ||
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Virtuelles Netz |0 (DE-588)4807205-9 |D s |
689 | 0 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 2 | |a Evaluation |0 (DE-588)4071034-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kounev, Samuel |0 (DE-588)112409895X |4 dgs | |
700 | 1 | |a Freiling, Felix C. |d 1970- |0 (DE-588)123244919 |4 dgs | |
700 | 1 | |a Meier, Michael |4 dgs | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:20-opus-141846 |
856 | 4 | 0 | |u https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-141846 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u http://d-nb.info/1122436068/34 |x Langzeitarchivierung Nationalbibliothek |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029420395&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029420395 |
Datensatz im Suchindex
_version_ | 1804177003512856576 |
---|---|
adam_text | ALEKSANDAR MILENKOSKI
EVALUATION OF INTRUSION DETECTION SYSTEMS
IN VIRTUALIZED ENVIRONMENTS
CONTENTS
ABSTRACT XIII
ZUSAMMENFASSUNG XVII
1 INTRODUCTION 1
1.1 M
OTIVATION.................................................................................................
1
1.2 PROBLEM STATEMENT: SHORTCOMINGS OF EXISTING A P P RO ACH ES
.................
3
1.2.1 W ORKLOADS
.....................................................................................
3
1.2.2 METRICS AND MEASUREMENT METHODOLOGIES
..................................
5
1.3 CONTRIBUTIONS OF THIS T H E S IS
....................................................................
7
1.4 O U TLIN E
......................................................................................................
11
2 FOUNDATIONS 13
2.1 INTRUSION DETECTION SYSTEM S
....................................................................
13
2.1.1 ATTACKS AND COMMON SECURITY M ECH AN ISM S
............................
13
2.1.2 INTRUSION DETECTION SYSTEMS: A SYSTEM
ATIZATION....................... 16
2.2 EVALUATION OF INTRUSION DETECTION SYSTEMS
.............................................
19
2.2.1 APPLICATION S CEN ARIO S
.................................................................
19
2.2.2 HISTORICAL O V E RV IE W
.................................................................... 21
2.3 SUM M
ARY...................................................................................................
23
3 IDS EVALUATION DESIGN SPACE: A SURVEY OF COMMON PRACTICES 25
3.1 RELATED WORK
...........................................................................................
25
3.2 W
ORKLOADS.................................................................................................
26
3.2.1 PURE BENIGN EXECUTABLE FORM * WORKLOAD DRIVERS
.
..............
27
3.2.2 PURE BENIGN
*
EXECUTABLE FORM * MANUAL GENERATION
...........
28
3.2.3 PURE MALICIOUS * EXECUTABLE FORM - EXPLOIT DATABASE .... 29
3.2.4 PURE MALICIOUS - EXECUTABLE FORM * * VULNERABILITY AND ATTACK
INJECTION........................................................................................
32
3.2.5 PURE MALICIOUS/PURE BENIGN/MIXED -* TRACE FORM TRACE
A CQ U ISITIO N
..................................................................................
34
3.2.6 PURE MALICIOUS/PURE BENIGN/MIXED
*
TRACE FORM ** TRACE
GENERATION.....................................................................................
36
3.3 M
ETRICS......................................................................................................
40
3.3.1 SECURITY-RELATED
*
B ASIC
..............................................................
41
3.3.2 SECURITY-RELATED - COMPOSITE
.
................................................... 43
3.4 MEASUREMENT M ETHODOLOGY
.....................................................
50
3.4.1 ATTACK DETECTION-RELATED P RO P E RTIE S
........................................... 54
3.4.2 RESOURCE CONSUMPTION-RELATED PROPERTIES
...............................
58
3.4.3 WORKLOAD PROCESSING C A P A C ITY
...................................................
60
3.4.4 PERFORMANCE O VERHEAD
.................................................................
61
3.5 SUMMARY: OPEN CHALLENGES AND IDS EVALUATION G U ID ELIN ES
..............
62
3.5.1 OPEN CHALLENGES: EVALUATING HYPERVISOR-BASED ID S S
..............
63
3.5.2 IDS EVALUATION
GUIDELINES............................................................
69
4 AN ANALYSIS OF HYPERCALL HANDLER VULNERABILITIES 77
4.1 SAMPLE SET OF HYPERCALL V ULNERABILITIES
................................................
78
4.2 ANALYSIS OF THE HYPERCALL ATTACK SURFACE
................................................
80
4.2.1 HYPERVISOR S PERSPECTIVE: ORIGINS OF HYPERCALL VULNERABILITIES .
80
4.2.2 HYPERVISOR S PERSPECTIVE: EFFECTS OF HYPERCALL A TTA C K S
...........
87
4.2.3 ATTACKER S PERSPECTIVE: ATTACK M O D
ELS........................................ 87
4.3 EXTENDING THE
FRONTIERS.............................................................................
88
4.3.1 VULNERABILITY DISCOVERY AND SECURE PROGRAMMING PRACTICES . . 90
4.3.2 SECURITY MECHANISMS
....................................................................
91
4.4 SUMMARY: LESSONS L EA RN ED
....................................................................
93
5 EVALUATION OF INTRUSION DETECTION SYSTEMS USING ATTACK INJECTION 97
5.1 BACKGROUND AND RELATED W O R K
....................................
98
5.2
APPROACH.......................................................................................................100
5.2.1 P LANNING
...........................................................................................
100
5.2.2 T
ESTING..............................................................................................
103
5.3 H LN JE C TO
R.......................................................................................................104
5.3.1 HLNJECTOR A
RCHITECTURE.....................................................................105
5.3.2 HLNJECTOR DESIGN
CRITERIA.........................................................
..
. 106
5.3.3 INJECTOR: PERFORMANCE OVERHEAD
....................................................108
5.4 CASE S TU D Y
....................................................................................................109
5.4.1 CASE STUDY: PLANNING
.....................................................................109
5.4.2 CASE STUDY: TESTING
..........................................................................
115
5.5 SUM M
ARY.......................................................................................................118
6 QUANTIFYING ATTACK DETECTION ACCURACY 119
6.1 RELATED WORK
..............................................................................................
120
6.2 ELASTICITY AND
ACCURACY................................................................................
122
6.3 METRIC AND MEASUREMENT M ETHODOLOGY
.........................
125
6.3.1 METRIC D ESIG N
................................................... 125
6.3.2 METRIC C O N STRU CTIO N
.......................................................................
127
6.3.3 PROPERTIES OF THE HE M E TRIC
.......................................
130
6.4 CASE S TU D IE
S.................................................................................................
131
6.4.1 HYPERVISOR
CONFIGURATIONS............................................................
132
6.4.2 IDS
CONFIGURATIONS..........................................................................
135
6.5 SUM M
ARY.............................................................. 139
7 CONCLUSIONS AND OUTLOOK 141
7.1 SUM M
ARY.......................................................................................................
141
7.2
OUTLOOK..........................................................................................................144
7.2.1 FUTURE TOPICS IN IDS EVALUATION
....................................................144
7.2.2 SECURITY OF HYPERVISORS HYPERCALL
INTERFACES................................146
7.2.3 EVALUATION OF INTRUSION DETECTION SYSTEMS USING ATTACK INJECTION
147
7.2.4 QUANTIFYING ATTACK DETECTION A CCURACY
........................................
148
7.2.5 FUTURE EVALUATION SCENARIOS
............................................................
149
APPENDICES 151
A TECHNICAL INFORMATION ON VULNERABILITIES OF HYPERCALL HANDLERS 153
A.L HYPERCALL M EM
ORY_OP................................................................................154
A.1.1 VULNERABILITY CVE-2012-3496
....................................................... 154
A. 1.2 VULNERABILITY CVE-2012-5513
....................................................... 157
A.2 HYPERCALL G N TTA B _ O P
...................................................................................159
A.2.1 VULNERABILITY CVE-2012-4539
....................................................... 160
A.2.2 VULNERABILITY CVE-2012-5510
....................................................... 163
A.2.3 VULNERABILITY CVE-2013-1964
....................................................... 165
A.3 HYPERCALL SET_ D EB U G REG
.............................................................................168
A.3.1 VULNERABILITY CVE-2012-3494
......................................................
168
A.4 HYPERCALL P H Y SD E V .O P
................................................................................171
A.4.1 VULNERABILITY CVE-2012-3495
......................................................
171
A.5 HYPERCALL M M U EX T_ O P
................................................................................173
A.5.1 VULNERABILITY CVE-2012-5525
....................................................... 173
LIST OF FIGURES 177
LIST OF TABLES 179
ACRONYMS 181
BIBLIOGRAPHY 185
|
any_adam_object | 1 |
author | Milenkoski, Aleksandar |
author_GND | (DE-588)1124098542 (DE-588)112409895X (DE-588)123244919 |
author_facet | Milenkoski, Aleksandar |
author_role | aut |
author_sort | Milenkoski, Aleksandar |
author_variant | a m am |
building | Verbundindex |
bvnumber | BV044012723 |
classification_rvk | ST 200 |
collection | ebook |
ctrlnum | (OCoLC)967725604 (DE-599)DNB1122436068 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02743nam a2200589zc 4500</leader><controlfield tag="001">BV044012723</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170927 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170125s2016 gw |||| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">17,O01</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1122436068</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967725604</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1122436068</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BY</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-2174</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Milenkoski, Aleksandar</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1124098542</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Evaluation of intrusion detection systems in virtualized environments</subfield><subfield code="b">= Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen</subfield><subfield code="c">Aleksandar Milenkoski ; Gutachter: Prof. Dr. Samuel Kounev, Prof. Dr. Felix Freiling, Prof. Dr. Michael Meier</subfield></datafield><datafield tag="246" ind1="1" ind2="1"><subfield code="a">Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Würzburg</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 201 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Julius-Maximilians-Universität Würzburg</subfield><subfield code="d">2016</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Langzeitarchivierung gewährleistet, LZA</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">Zusammenfassung in deutscher und englischer Sprache</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Evaluation</subfield><subfield code="0">(DE-588)4071034-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Virtuelles Netz</subfield><subfield code="0">(DE-588)4807205-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intrusion detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">evaluation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">virtualized environments</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Virtuelles Netz</subfield><subfield code="0">(DE-588)4807205-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Evaluation</subfield><subfield code="0">(DE-588)4071034-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kounev, Samuel</subfield><subfield code="0">(DE-588)112409895X</subfield><subfield code="4">dgs</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Freiling, Felix C.</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)123244919</subfield><subfield code="4">dgs</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meier, Michael</subfield><subfield code="4">dgs</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:20-opus-141846</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-141846</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://d-nb.info/1122436068/34</subfield><subfield code="x">Langzeitarchivierung Nationalbibliothek</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029420395&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029420395</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV044012723 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:41:10Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029420395 |
oclc_num | 967725604 |
open_access_boolean | 1 |
owner | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
owner_facet | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
physical | xx, 201 Seiten Diagramme |
psigel | ebook |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
record_format | marc |
spelling | Milenkoski, Aleksandar Verfasser (DE-588)1124098542 aut Evaluation of intrusion detection systems in virtualized environments = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen Aleksandar Milenkoski ; Gutachter: Prof. Dr. Samuel Kounev, Prof. Dr. Felix Freiling, Prof. Dr. Michael Meier Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen Würzburg 2016 xx, 201 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Dissertation Julius-Maximilians-Universität Würzburg 2016 Langzeitarchivierung gewährleistet, LZA Zusammenfassung in deutscher und englischer Sprache Evaluation (DE-588)4071034-8 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Virtuelles Netz (DE-588)4807205-9 gnd rswk-swf intrusion detection evaluation virtualized environments (DE-588)4113937-9 Hochschulschrift gnd-content Virtuelles Netz (DE-588)4807205-9 s Eindringerkennung (DE-588)4706627-1 s Evaluation (DE-588)4071034-8 s DE-604 Kounev, Samuel (DE-588)112409895X dgs Freiling, Felix C. 1970- (DE-588)123244919 dgs Meier, Michael dgs Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:20-opus-141846 https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-141846 Resolving-System kostenfrei Volltext http://d-nb.info/1122436068/34 Langzeitarchivierung Nationalbibliothek DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029420395&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Milenkoski, Aleksandar Evaluation of intrusion detection systems in virtualized environments = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen Evaluation (DE-588)4071034-8 gnd Eindringerkennung (DE-588)4706627-1 gnd Virtuelles Netz (DE-588)4807205-9 gnd |
subject_GND | (DE-588)4071034-8 (DE-588)4706627-1 (DE-588)4807205-9 (DE-588)4113937-9 |
title | Evaluation of intrusion detection systems in virtualized environments = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen |
title_alt | Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen |
title_auth | Evaluation of intrusion detection systems in virtualized environments = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen |
title_exact_search | Evaluation of intrusion detection systems in virtualized environments = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen |
title_full | Evaluation of intrusion detection systems in virtualized environments = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen Aleksandar Milenkoski ; Gutachter: Prof. Dr. Samuel Kounev, Prof. Dr. Felix Freiling, Prof. Dr. Michael Meier |
title_fullStr | Evaluation of intrusion detection systems in virtualized environments = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen Aleksandar Milenkoski ; Gutachter: Prof. Dr. Samuel Kounev, Prof. Dr. Felix Freiling, Prof. Dr. Michael Meier |
title_full_unstemmed | Evaluation of intrusion detection systems in virtualized environments = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen Aleksandar Milenkoski ; Gutachter: Prof. Dr. Samuel Kounev, Prof. Dr. Felix Freiling, Prof. Dr. Michael Meier |
title_short | Evaluation of intrusion detection systems in virtualized environments |
title_sort | evaluation of intrusion detection systems in virtualized environments bewertung von angriffserkennungssystemen in virtualisierten umgebungen |
title_sub | = Bewertung von Angriffserkennungssystemen in Virtualisierten Umgebungen |
topic | Evaluation (DE-588)4071034-8 gnd Eindringerkennung (DE-588)4706627-1 gnd Virtuelles Netz (DE-588)4807205-9 gnd |
topic_facet | Evaluation Eindringerkennung Virtuelles Netz Hochschulschrift |
url | https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-141846 http://d-nb.info/1122436068/34 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029420395&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT milenkoskialeksandar evaluationofintrusiondetectionsystemsinvirtualizedenvironmentsbewertungvonangriffserkennungssystemeninvirtualisiertenumgebungen AT kounevsamuel evaluationofintrusiondetectionsystemsinvirtualizedenvironmentsbewertungvonangriffserkennungssystemeninvirtualisiertenumgebungen AT freilingfelixc evaluationofintrusiondetectionsystemsinvirtualizedenvironmentsbewertungvonangriffserkennungssystemeninvirtualisiertenumgebungen AT meiermichael evaluationofintrusiondetectionsystemsinvirtualizedenvironmentsbewertungvonangriffserkennungssystemeninvirtualisiertenumgebungen AT milenkoskialeksandar bewertungvonangriffserkennungssystemeninvirtualisiertenumgebungen AT kounevsamuel bewertungvonangriffserkennungssystemeninvirtualisiertenumgebungen AT freilingfelixc bewertungvonangriffserkennungssystemeninvirtualisiertenumgebungen AT meiermichael bewertungvonangriffserkennungssystemeninvirtualisiertenumgebungen |