Shouzhong Tu

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Nowadays, the Infrastructure as a Service (IaaS) cloud has become the new target of attackers and the security of virtual machine (VM) in cloud is attracting more and more attention. In this paper, we propose to use virtualization to combine information of system level with that of network level and monitor the behavior of VM at the granularity of process.(More)
Scanning acquires status information regarding target hosts. In networks, attackers often conduct coordinated scans of the target host or network segment because such scans are efficient and stealthy. However, an algorithm that effectively detects coordinated scans has not yet been developed. In this study, we identify a coordinated scan under a single(More)
  • 1