Cloud Network Security Monitoring and Response System

被引:0
|
作者
Mukhtarov, Murat [1 ]
Miloslavskaya, Natalia [1 ]
Tolstoy, Alexander [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Informat Secur Fac, Moscow, Russia
来源
THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012) | 2012年
关键词
Cloud computing; Cloud infrastructure; Virtual Infrastructure; Application Hosting; Network Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The public clouds network monitoring and response system, based on flow measurements, open source tools and CSMS (Cloud Security Monitoring System) module, is to be introduced in this paper. The main goal of the research is to develop an algorithm and to implement a system, which automatically detects and makes a response to network anomalies, occurring inside a Cloud infrastructure. In this research is proposed approach of anomaly detection inside the Cloud infrastructure which is based on a profiling method of IPFIX (IP Flow Information Export) protocol data and idea of negative selection principle is used for generating signatures of network anomalies, which are named detectors. The automatic response module makes a decision about network anomalies origin, based on several iterative checks and creates a record on the firewall rules table. The network traffic profiling process automatically generates the firewall rules set for all traffic classes, obtained during the learning process. Main results of the research are development of the algorithms and the way of the monitoring network attacks inside the Cloud. Implementation of the algorithms is python-based script and currently stays under hard-testing phase.
引用
收藏
页码:181 / 185
页数:5
相关论文
共 50 条
  • [1] Network Security Threats and Cloud Infrastructure Services Monitoring
    Mukhtarov, Murat
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 141 - 145
  • [2] Design of automatic monitoring system for network information security in cloud computing environment
    Niu, Jing
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 21 (1-2) : 19 - 34
  • [3] A Web-Based Monitoring System of Network Security Functions in Blockchain-Based Cloud Security Systems
    Kim, Jeonghyeon
    Lingga, Patrick
    Jeong, Jaehoon Paul
    Choi, Yunchul
    Park, JungSoo
    36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 454 - 459
  • [4] Network Virtualization System for Security in Cloud Computing
    Ashalatha, R.
    Agarkhed, Jayashree
    Patil, Siddarama
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 346 - 350
  • [5] Design of the Network Security Intrusion Detection System Based on the Cloud Computing
    Di, Meng
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 68 - 73
  • [6] A Survey on Vehicular Cloud Network Security
    Deng, Junyi
    Deng, Jikai
    Liu, Peihao
    Wang, Huan
    Yan, Junjie
    Pan, Deru
    Liu, Jiahua
    IEEE ACCESS, 2023, 11 : 136741 - 136757
  • [7] Customized Network Security for Cloud Service
    He, Jin
    Ota, Kaoru
    Dong, Mianxiong
    Yang, Laurence T.
    Fan, Mingyu
    Wang, Guangwei
    Yau, Stephen S.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (05) : 801 - 814
  • [8] Design of network security storage system based on under cloud computing technology
    ThiBac, Do
    Minh, Nguyen Hieu
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
  • [9] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)
  • [10] An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology
    Nathiya, T.
    Suseendran, G.
    DATA MANAGEMENT, ANALYTICS AND INNOVATION, ICDMAI 2018, VOL 2, 2019, 839 : 483 - 497