Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment

被引:0
作者
Zhang, Ruirui [1 ]
Xiao, Xin [2 ]
机构
[1] Sichuan Agr Univ, Sch Business, Chengdu 610000, Sichuan, Peoples R China
[2] Southwest Minzu Univ, Sch Comp Sci, Chengdu 610000, Sichuan, Peoples R China
关键词
Virtual machine - Signal processing - Intrusion detection - Network security - Application programs - Cloud security;
D O I
10.1155/2017/2301970
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the security of virtual machine systems is the core of cloud computing security. This paper presents an immune-based intrusion detection model in virtual machines of cloud computing environment, denoted as IB-IDS, to ensure the safety of user-level applications in client virtual machines. In the model, system call sequences and their parameters of processes are used, and environment information in the client virtual machines is extracted. Then the model simulates immune responses to ensure the state of user-level programs, which can detect attacks on the dynamic runtime of applications and has high real-time performance. There are five modules in the model: antigen presenting module, signal acquisition module, immune response module, signal measurement module, and information monitoring module, which are distributed into different levels of virtual machine environment. Performance analysis and experimental results show that the model brings a small performance overhead for the virtualmachine system and has a good detection performance. It is applicable to judge the state of user-level application in guest virtual machine, and it is feasible to use it to increase the user-level security in software services of cloud computing platform.
引用
收藏
页数:15
相关论文
共 20 条
[1]  
[Anonymous], 2003, ACM SIGOPS OPERATING
[2]   Detecting Kernel-Level Rootkits Using Data Structure Invariants [J].
Baliga, Arati ;
Ganapathy, Vinod ;
Iftode, Liviu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) :670-684
[3]   Technological networks and the spread of computer viruses [J].
Balthrop, J ;
Forrest, S ;
Newman, MEJ ;
Williamson, MM .
SCIENCE, 2004, 304 (5670) :527-529
[4]  
Benzina H, 2011, LECT NOTES COMPUT SC, V6514, P244, DOI 10.1007/978-3-642-19348-4_18
[5]  
Bharadwaja S., 2011, Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG), P695, DOI 10.1109/ITNG.2011.123
[6]  
Chisnall D., 2007, DEFINITIVE GUIDE XEN, V2nd
[7]  
D'haeseleer P., P 1996 IEEE S SEC PR, P110
[8]  
De-Yi L.I., 2004, J SOFTW, V15, P2
[9]  
Forrest S., P 1994 IEEE COMP SOC, P202
[10]   A machine learning evaluation of an artificial immune system [J].
Glickman, M ;
Balthrop, J ;
Forrest, S .
EVOLUTIONARY COMPUTATION, 2005, 13 (02) :179-212