Cloud Network Security Monitoring and Response System

被引:0
|
作者
Mukhtarov, Murat [1 ]
Miloslavskaya, Natalia [1 ]
Tolstoy, Alexander [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Informat Secur Fac, Moscow, Russia
来源
THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012) | 2012年
关键词
Cloud computing; Cloud infrastructure; Virtual Infrastructure; Application Hosting; Network Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The public clouds network monitoring and response system, based on flow measurements, open source tools and CSMS (Cloud Security Monitoring System) module, is to be introduced in this paper. The main goal of the research is to develop an algorithm and to implement a system, which automatically detects and makes a response to network anomalies, occurring inside a Cloud infrastructure. In this research is proposed approach of anomaly detection inside the Cloud infrastructure which is based on a profiling method of IPFIX (IP Flow Information Export) protocol data and idea of negative selection principle is used for generating signatures of network anomalies, which are named detectors. The automatic response module makes a decision about network anomalies origin, based on several iterative checks and creates a record on the firewall rules table. The network traffic profiling process automatically generates the firewall rules set for all traffic classes, obtained during the learning process. Main results of the research are development of the algorithms and the way of the monitoring network attacks inside the Cloud. Implementation of the algorithms is python-based script and currently stays under hard-testing phase.
引用
收藏
页码:181 / 185
页数:5
相关论文
共 50 条
  • [41] Research on the active defense security system based on cloud computing of wisdom campus network
    Chen, Yuanyuan
    Yao, Wang
    Luo, Jianghua
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 1292 - 1297
  • [42] Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
    Chen, Zhen
    Han, Fuye
    Cao, Junwei
    Jiang, Xin
    Chen, Shuo
    TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (01) : 40 - 50
  • [43] A Network Security Situation Awareness Model Based on Artificial Immunity System and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 479 - 482
  • [44] A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures
    Chen, Zhijiang
    Xu, Guobin
    Mahalingam, Vivek
    Ge, Linqiang
    James Nguyen
    Yu, Wei
    Lu, Chao
    BIG DATA RESEARCH, 2016, 3 : 10 - 23
  • [45] Security by Simple Network Traffic Monitoring
    Tsunoda, Hiroshi
    Keeni, Glenn Mansfield
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 201 - 204
  • [46] Present and Future of Network Security Monitoring
    Fuentes-Garcia, Marta
    Camacho, Jose
    Macia-Fernandez, Gabriel
    IEEE ACCESS, 2021, 9 : 112744 - 112760
  • [47] Enhancing Cloud Security through Policy Monitoring Techniques
    Loganayagi, B.
    Sujatha, S.
    COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 270 - +
  • [48] Scalable and fault tolerant monitoring of security parameters in the cloud
    Irimie, Bogdan-Constantin
    Petcu, Dana
    2015 17TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 289 - 295
  • [49] Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System
    Ling, Xiaobo
    Qi, Longyun
    Li, Man
    Yan, Jun
    CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 195 - 206
  • [50] A Framework for Monitoring and Security Authentication in Cloud based on Eucalyptus
    Gao, Zefeng
    Li, Xiaoyong
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 349 - 353