Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment

被引:0
作者
Zhang, Ruirui [1 ]
Xiao, Xin [2 ]
机构
[1] Sichuan Agr Univ, Sch Business, Chengdu 610000, Sichuan, Peoples R China
[2] Southwest Minzu Univ, Sch Comp Sci, Chengdu 610000, Sichuan, Peoples R China
关键词
Virtual machine - Signal processing - Intrusion detection - Network security - Application programs - Cloud security;
D O I
10.1155/2017/2301970
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the security of virtual machine systems is the core of cloud computing security. This paper presents an immune-based intrusion detection model in virtual machines of cloud computing environment, denoted as IB-IDS, to ensure the safety of user-level applications in client virtual machines. In the model, system call sequences and their parameters of processes are used, and environment information in the client virtual machines is extracted. Then the model simulates immune responses to ensure the state of user-level programs, which can detect attacks on the dynamic runtime of applications and has high real-time performance. There are five modules in the model: antigen presenting module, signal acquisition module, immune response module, signal measurement module, and information monitoring module, which are distributed into different levels of virtual machine environment. Performance analysis and experimental results show that the model brings a small performance overhead for the virtualmachine system and has a good detection performance. It is applicable to judge the state of user-level application in guest virtual machine, and it is feasible to use it to increase the user-level security in software services of cloud computing platform.
引用
收藏
页数:15
相关论文
共 20 条
[11]  
Haeberlen A., 2010, P IN 9 USENIX S OP S
[12]   Ensuring Operating System Kernel Integrity with OSck [J].
Hofmann, Owen S. ;
Dunn, Alan M. ;
Kim, Sangman ;
Roy, Indrajit ;
Witchel, Emmett .
ACM SIGPLAN NOTICES, 2011, 46 (03) :279-290
[13]  
Pal Singh J., 1992, Computer Architecture News, V20, P5, DOI 10.1145/130823.130824
[14]   Lares: An architecture for secure active monitoring using virtualization [J].
Payne, Bryan D. ;
Carbone, Martim ;
Sharif, Monirul ;
Lee, Wenke .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :233-247
[15]  
Sharif M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P477
[16]  
Srivastava A, 2011, LECT NOTES COMPUT SC, V6739, P214, DOI 10.1007/978-3-642-22424-9_13
[17]  
Szefer J, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P401
[18]  
[王丽娜 Wang Lina], 2011, [计算机研究与发展, Journal of Computer Research and Development], V48, P1534
[19]  
Wang Z, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P545
[20]  
Woo S. C., P 22 ANN INT S COMP, P24