{"title":"基于云的在线服务用户面临的威胁(以及我们能做些什么)","authors":"G. Stringhini","doi":"10.1109/HPCSim.2015.7237026","DOIUrl":null,"url":null,"abstract":"In this paper we highlighted some threats that affect the users of cloud-based online services. We then presented a handful of systems that we developed over the last years to detect and block malicious activity on online services. Although the threat landscape is constantly evolving, we believe that such techniques constitute a good foundation to increasing the security of online service users.","PeriodicalId":134009,"journal":{"name":"2015 International Conference on High Performance Computing & Simulation (HPCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the threats to Cloud-based online service users (and what we can do about them)\",\"authors\":\"G. Stringhini\",\"doi\":\"10.1109/HPCSim.2015.7237026\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we highlighted some threats that affect the users of cloud-based online services. We then presented a handful of systems that we developed over the last years to detect and block malicious activity on online services. Although the threat landscape is constantly evolving, we believe that such techniques constitute a good foundation to increasing the security of online service users.\",\"PeriodicalId\":134009,\"journal\":{\"name\":\"2015 International Conference on High Performance Computing & Simulation (HPCS)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on High Performance Computing & Simulation (HPCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HPCSim.2015.7237026\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on High Performance Computing & Simulation (HPCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HPCSim.2015.7237026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the threats to Cloud-based online service users (and what we can do about them)
In this paper we highlighted some threats that affect the users of cloud-based online services. We then presented a handful of systems that we developed over the last years to detect and block malicious activity on online services. Although the threat landscape is constantly evolving, we believe that such techniques constitute a good foundation to increasing the security of online service users.