Cloud computing for network security intrusion detection system

被引:3
作者
机构
[1] School of Information Science and Technology, Southwest Jiaotong Univ., Chengdu
[2] Department of Computer Science, LeShan Normal Univ.
[3] Military Representative Office of PLA, Guiyang
关键词
Artificial immune systems; Cloud computing; Network security;
D O I
10.4304/jnw.8.1.140-147
中图分类号
学科分类号
摘要
In recent years, as a new distributed computing model, cloud computing has developed rapidly and become the focus of academia and industry. But now the security issue of cloud computing is a main critical problem of most enterprise customers faced. In the current network environment, that relying on a single terminal to check the Trojan virus is considered increasingly unreliable. This paper analyzes the characteristics of current cloud computing, and then proposes a comprehensive real-time network risk evaluation model for cloud computing based on the correspondence between the artificial immune system antibody and pathogen invasion intensity. The paper also combines assets evaluation system and network integration evaluation system, considering from the application layer, the host layer, network layer may be factors that affect the network risks. The experimental results show that this model improves the ability of intrusion detection and can support for the security of current cloud computing. © 2013 ACADEMY PUBLISHER.
引用
收藏
页码:140 / 147
页数:7
相关论文
共 14 条
[1]  
Sangkatsanee P., Wattanapongsakorn N., Charnsripinyo C., Practical real-time intrusion detection using machine learning approaches, Computer Communications, 34, pp. 2227-2235, (2011)
[2]  
Elshoush H.T., Alert correlation in collaborative intelligent intrusion detection systems-A survey, Applied Soft Computing, 11, pp. 4349-4365, (2011)
[3]  
Amiri F., Yousefi M.M.R., Mutual information-based feature selection for intrusion detection systems, Journal of Network and Computer Applications, 34, 4, pp. 1184-1199, (2011)
[4]  
Toubiana V., Labiod H., Reynaud L., A global security architecture for operated hybrid WLAN mesh networks, Computer Networks, 54, 2, pp. 218-230, (2010)
[5]  
Kuby J., Immunology
[6]  
Burnet F.M., The Clone Selection Theory of Acquired Immunity, (1959)
[7]  
Hofmeyr S.A., Forrest S., Architecture for an artificial immune system, Evolutionary Computation, 8, pp. 443-473, (2000)
[8]  
Forrest S., Perelson A.S., Allen L., Cherukuri R., Self-Nonself Discrimination in a Computer, (1994)
[9]  
Atay S., Masera M., Challenges for the security analysis of Next Generation Networks, Information Security Technical Report, 16, pp. 3-11, (2011)
[10]  
Mezmaz M., Melab N., Kessaci Y., A parallel bi-objective hybrid metaheuristic for energy-aware scheduling for cloud computing systems, Journal of Parallel and Distributed Computing, 71, pp. 1497-1508, (2011)