Cloud Network Security Monitoring and Response System

被引:0
|
作者
Mukhtarov, Murat [1 ]
Miloslavskaya, Natalia [1 ]
Tolstoy, Alexander [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Informat Secur Fac, Moscow, Russia
来源
THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012) | 2012年
关键词
Cloud computing; Cloud infrastructure; Virtual Infrastructure; Application Hosting; Network Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The public clouds network monitoring and response system, based on flow measurements, open source tools and CSMS (Cloud Security Monitoring System) module, is to be introduced in this paper. The main goal of the research is to develop an algorithm and to implement a system, which automatically detects and makes a response to network anomalies, occurring inside a Cloud infrastructure. In this research is proposed approach of anomaly detection inside the Cloud infrastructure which is based on a profiling method of IPFIX (IP Flow Information Export) protocol data and idea of negative selection principle is used for generating signatures of network anomalies, which are named detectors. The automatic response module makes a decision about network anomalies origin, based on several iterative checks and creates a record on the firewall rules table. The network traffic profiling process automatically generates the firewall rules set for all traffic classes, obtained during the learning process. Main results of the research are development of the algorithms and the way of the monitoring network attacks inside the Cloud. Implementation of the algorithms is python-based script and currently stays under hard-testing phase.
引用
收藏
页码:181 / 185
页数:5
相关论文
共 50 条
  • [21] Research on Cloud Computing and Network Security in Digital Manufacturing Platform
    Chang, Zhenyun
    Zhao, Yuling
    Qian, Dongmei
    Wang, Ning
    GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 219 - 222
  • [22] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [23] Cloud Security System Construction and its Concrete Realization
    Wu Jing
    Zhao Fengzhi
    Dong Yudan
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 193 - 196
  • [24] Data Security Monitoring Platform in Cloud for Enterprise
    Yushui, Geng
    Shunpeng, Pang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 67 - 78
  • [25] Towards Cloud Security Monitoring: A Case Study
    Ismail, Umar Mukhtar
    Islam, Syed
    Islam, Shareeful
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 8 - 14
  • [26] Application of cloud computing in power security monitoring
    Wang, Xiaofeng
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2019, 19 (S1) : S195 - S201
  • [27] Multi-cloud Applications Security Monitoring
    Carvallo, Pamela
    Cavalli, Ana R.
    Mallouli, Wissam
    Rios, Erkuden
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 748 - 758
  • [28] Cloud Security Audit for Migration and Continuous Monitoring
    Ismail, Umar Mukhtar
    Islam, Shareeful
    Mouratidis, Haralambos
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1081 - 1087
  • [29] Analysis of Campus Network Security Emergency Response Linkage System
    Zhang, Xingang
    Wang, Baoping
    Cheng, Xindang
    Liu, Jun
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 1016 - 1020
  • [30] Network security risk detection method for smart microgrid monitoring system
    Wu X.
    Yang Y.
    Fan X.
    Yu Y.
    Wu Y.
    Advanced Control for Applications: Engineering and Industrial Systems, 2024, 6 (02):