An Anomaly Detection on the Application-Layer-Based QoS in the Cloud Storage System

被引:5
作者
Han, Dezhi [1 ]
Bi, Kun [1 ]
Xie, Bolin [2 ]
Huang, Lili [1 ]
Wang, Ruijun [3 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[2] Guangdong Univ Foreign Studies, Coll Informat, Guangzhou 510420, Guangdong, Peoples R China
[3] Univ Cent Florida, Coll Elect Engn & Comp Sci, Orlando, FL 48126 USA
基金
中国国家自然科学基金;
关键词
cloud storage system; application layer anomaly detection; quality of service for I/O request; hidden semi-Markov model;
D O I
10.2298/CSIS160201021H
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks based on the application layer of the cloud storage system have been dramatically increasing nowadays. However, the present detection studies of attacks are mainly focused on the network and transmission layer instead of the application layer. In this paper, we proposed an anomaly attack detection method based on the hidden semi-Markov model (HsMM) to secure the cloud storage system from the application-layer-based attacks. In this proposed method, observation serials are constituted by the time intervals between the I/O requests made by normal users and their characterization using the hidden semi-Markov model based on each protocol for application layer. By applying this technique in the cloud storage system, it is able to effectively detect and correct their abnormal behaviors. In addition, to ensure the QoS(Quality of Service), a Priority Queuing and flow controlling module is proposed in this paper, which can allocate more I/O bandwidths and resources to normal users. Besides, the experimental results have shown that the proposed method can describe such normal I/O behaviors of users based on each protocol for the application layer in the cloud storage system with 99.2% higher detection ratio and 0.7% lower false positive ratio when detecting abnormal behaviors of users, and it can ensure the QoS for normal uses.
引用
收藏
页码:659 / 676
页数:18
相关论文
共 20 条
[1]  
[Anonymous], 2012, Study on the low-carbon economy model of panjiang coal mining area
[2]   Tackling Application-layer DDoS Attacks [J].
Beitollahi, Hakem ;
Deconinck, Geert .
ANT 2012 AND MOBIWIS 2012, 2012, 10 :432-441
[3]   Analyzing well-known countermeasures against distributed denial of service attacks [J].
Beitollahi, Hakem ;
Deconinck, Geert .
COMPUTER COMMUNICATIONS, 2012, 35 (11) :1312-1332
[4]   Stealthy Denial of Service Strategy in Cloud Computing [J].
Ficco, Massimo ;
Rak, Massimiliano .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (01) :80-94
[5]  
[顾晓清 Gu Xiaoqing], 2013, [计算机应用, Journal of Computer Applications], V33, P2228
[6]  
Jun W, 2014, CLOUD STORAGE TECHNO
[7]   THE TEMPORAL LOGIC OF ACTIONS [J].
LAMPORT, L .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1994, 16 (03) :872-923
[8]  
Sun Chang-hua, 2009, Acta Electronica Sinica, V37, P1562
[9]   DDoS Defense by Offense [J].
Walfish, Michael ;
Vutukuru, Mythili ;
Balakrishnan, Hari ;
Karger, David ;
Shenker, Scott .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2010, 28 (01)
[10]  
Wang K, 2004, LECT NOTES COMPUT SC, V3224, P203