Security event correlation approach for cloud computing

被引:0
|
作者
机构
[1] Ficco, Massimo
来源
Ficco, M. (massimo.ficco@unina2.it) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 07期
关键词
Architectural levels - Complex event processing - Distributed security - Event correlation - New business models - Prototype implementations - Public organisation - Security;
D O I
10.1504/IJHPCN.2013.056525
中图分类号
学科分类号
摘要
Cloud computing is a new business model, which represents an opportunity for users, companies, and public organisations to reduce costs and increase efficiency, as well as an alternative way for providing services and resources. In this pay-by-use model, security plays a key role. Cyber attacks are a serious danger, which can compromise the quality of the service delivered to the customers, as well as the costs of the provided cloud resources and services. In this paper, a hybrid and hierarchical event correlation approach for intrusion detection in cloud computing is presented. It consists of detecting intrusion symptoms by collecting diverse information at several cloud architectural levels, using distributed security probes, as well as performing complex event analysis based on a complex event processing engine. The escalation process from intrusion symptoms to the identified cause and target of the intrusion is driven by a knowledge-base represented by an ontology. A prototype implementation of the proposed intrusion detection solution is also presented. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
相关论文
共 50 条
  • [1] Security information and event management in the cloud computing infrastructure
    Pavlik, Jakub
    Komarek, Ales
    Sobeslav, Vladimir
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2014, : 209 - 214
  • [2] Monitoring based security approach for cloud computing
    Yadav A.
    Ritika
    Garg M.L.
    Ingenierie des Systemes d'Information, 2019, 24 (06): : 611 - 617
  • [3] A Layered Security Approach for Cloud Computing Infrastructure
    Yildiz, Mehmet
    Abawajy, Jemal
    Ercan, Tuncay
    Bernoth, Andrew
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 763 - +
  • [4] A Novel Approach to Cloud Computing: Infrastructure as a Service Security
    Jain, Sarika
    Tyagi, Prachi
    Kalra, Siddharth
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 501 - 504
  • [5] A combined approach to ensure data security in cloud computing
    Sood, Sandeep K.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1831 - 1838
  • [6] An Approach to Security-SLA in Cloud Computing Environment
    da Silva, Carlos Alberto
    de Geus, Paulo Licio
    2014 IEEE LATIN-AMERICA CONFERENCE ON COMMUNICATIONS (LATINCOM), 2014,
  • [7] Security in cloud computing
    International Journal of Information Security, 2014, 13 : 95 - 96
  • [8] Security for Cloud Computing
    Nazeer, Shahrin A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 51 - 60
  • [9] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [10] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19