Cloud Network Security Monitoring and Response System

被引:0
|
作者
Mukhtarov, Murat [1 ]
Miloslavskaya, Natalia [1 ]
Tolstoy, Alexander [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Informat Secur Fac, Moscow, Russia
来源
THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012) | 2012年
关键词
Cloud computing; Cloud infrastructure; Virtual Infrastructure; Application Hosting; Network Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The public clouds network monitoring and response system, based on flow measurements, open source tools and CSMS (Cloud Security Monitoring System) module, is to be introduced in this paper. The main goal of the research is to develop an algorithm and to implement a system, which automatically detects and makes a response to network anomalies, occurring inside a Cloud infrastructure. In this research is proposed approach of anomaly detection inside the Cloud infrastructure which is based on a profiling method of IPFIX (IP Flow Information Export) protocol data and idea of negative selection principle is used for generating signatures of network anomalies, which are named detectors. The automatic response module makes a decision about network anomalies origin, based on several iterative checks and creates a record on the firewall rules table. The network traffic profiling process automatically generates the firewall rules set for all traffic classes, obtained during the learning process. Main results of the research are development of the algorithms and the way of the monitoring network attacks inside the Cloud. Implementation of the algorithms is python-based script and currently stays under hard-testing phase.
引用
收藏
页码:181 / 185
页数:5
相关论文
共 50 条
  • [31] RETRACTED: Design of Network Security Attack and Defense Target Range System Based on Cloud Computing (Retracted Article)
    Huang, Zuyuan
    Zhou, Jing
    IHIP 2018: 2018 INTERNATIONAL CONFERENCE ON INFORMATION HIDING AND IMAGE PROCESSING, 2018, : 5 - 8
  • [32] Research on the Construction of Network Security Attack and Defense Range System in Power Monitoring System
    Wei Mingxin
    INFORMATION TECHNOLOGY AND INTELLIGENT TRANSPORTATION SYSTEMS (ITITS 2017), 2017, 296 : 82 - 90
  • [33] Research on Security Mechanism of Cloud Security Immune System
    Huo, Lin
    Zhou, Jingxiong
    Liu, Xiangwei
    INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, : 83 - 89
  • [34] The Application of Network Security Technology in Computer Laboratory based on Cloud Computing
    Wang Liangliang
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 104 - 107
  • [35] A Transformer-based network intrusion detection approach for cloud security
    Zhenyue Long
    Huiru Yan
    Guiquan Shen
    Xiaolu Zhang
    Haoyang He
    Long Cheng
    Journal of Cloud Computing, 13
  • [36] Improving cloud network security using the Tree-Rule firewall
    He, Xiangjian
    Chomsiri, Thawatchai
    Nanda, Priyadarsi
    Tan, Zhiyuan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 116 - 126
  • [37] A Transformer-based network intrusion detection approach for cloud security
    Long, Zhenyue
    Yan, Huiru
    Shen, Guiquan
    Zhang, Xiaolu
    He, Haoyang
    Cheng, Long
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [38] Vehicular Cloud Network and Information Security Mechanisms
    Wu, Hsin-Te
    Horng, Gwo-Jiun
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 196 - 199
  • [39] A Network Security Situation Awareness Model Based on Artificial Immunity System and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 212 - 218
  • [40] Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
    Zhen Chen
    Fuye Han
    Junwei Cao
    Xin Jiang
    Shuo Chen
    TsinghuaScienceandTechnology, 2013, 18 (01) : 40 - 50