Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning

被引:16
作者
Khorshed, Md Tanzim [1 ]
Ali, A. B. M. Shawkat [1 ]
Wasimi, Saleh A. [1 ]
机构
[1] CQUniv, Sch Informat & Commun Technol, Rockhampton, Qld 4702, Australia
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
关键词
Security; threats; machine learning; cyber attacks; cloud computing; insiders;
D O I
10.1109/TrustCom.2011.99
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may make the detection process even harder. We found these insiders' activities form similar pattern in the monitoring systems as some other cyber attacks because these also uses huge computer resources. In this paper we first provide a brief overview on the importance of monitoring insiders' activities through a literature survey on cloud computing security. Then, we observe some of the real life insiders' activities that can be detected from the performance data in a hypervisor and its guest operating systems. Rule based learning is successfully used for identification of these activities in this research. We further observe that some of these insiders' activities can on occasions turn into a malicious insider's attack, and thus, need constant monitoring in the cloud environment.
引用
收藏
页码:757 / 764
页数:8
相关论文
共 33 条
[1]  
[Anonymous], SECURITY GUIDANCE CR
[2]  
[Anonymous], UNISYS SECURE CLOUD
[3]  
[Anonymous], DANCHO DANCHEVS 0531
[4]  
[Anonymous], NIST CLOUD COMP PROG
[5]  
[Anonymous], FUTURE CLOUD COMPUTI
[6]  
[Anonymous], 3 MAJOR BARRIERS CLO
[7]  
[Anonymous], IEEE SECURITY PRIVAC
[8]  
[Anonymous], 2014, C4. 5: programs for machine learning
[9]  
[Anonymous], MONITORING INTRUSION
[10]  
[Anonymous], 2009, DEP ELECT ENG COMPUT