Skip to main content

Research Repository

Advanced Search

All Outputs (2)

PROTECT: Container process isolation using system call interception (2017)
Conference Proceeding
Win, T. Y., Tso, F. P., Mair, Q., & Tianfield, H. (in press). PROTECT: Container process isolation using system call interception. In 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks \& 2017 11th International Conference on Frontier of Computer Science and Technology \& 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC). , (191-196). https://doi.org/10.1109/ISPAN-FCST-ISCC.2017.24

Virtualization is the underpinning technology enabling cloud computing service provisioning, and container-based virtualization provides an efficient sharing of the underlying host kernel libraries amongst multiple guests. While there has been resear... Read More about PROTECT: Container process isolation using system call interception.

Big data based security analytics for protecting virtualized infrastructures in cloud computing (2017)
Journal Article
Win, T. Y., Tianfield, H., & Mair, Q. (2018). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data, 4(1), 11-25. https://doi.org/10.1109/TBDATA.2017.2715335

Virtualized infrastructure in cloud computing has become an attractive target for cyberattackers to launch advanced attacks. This paper proposes a novel big data based security analytics approach to detecting advanced attacks in virtualized infrastru... Read More about Big data based security analytics for protecting virtualized infrastructures in cloud computing.