Security event correlation approach for cloud computing

被引:0
|
作者
机构
[1] Ficco, Massimo
来源
Ficco, M. (massimo.ficco@unina2.it) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 07期
关键词
Architectural levels - Complex event processing - Distributed security - Event correlation - New business models - Prototype implementations - Public organisation - Security;
D O I
10.1504/IJHPCN.2013.056525
中图分类号
学科分类号
摘要
Cloud computing is a new business model, which represents an opportunity for users, companies, and public organisations to reduce costs and increase efficiency, as well as an alternative way for providing services and resources. In this pay-by-use model, security plays a key role. Cyber attacks are a serious danger, which can compromise the quality of the service delivered to the customers, as well as the costs of the provided cloud resources and services. In this paper, a hybrid and hierarchical event correlation approach for intrusion detection in cloud computing is presented. It consists of detecting intrusion symptoms by collecting diverse information at several cloud architectural levels, using distributed security probes, as well as performing complex event analysis based on a complex event processing engine. The escalation process from intrusion symptoms to the identified cause and target of the intrusion is driven by a knowledge-base represented by an ontology. A prototype implementation of the proposed intrusion detection solution is also presented. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
相关论文
共 50 条
  • [21] A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure
    Banirostam, Hamid
    Hedayati, Alireza
    Zadeh, Ahmad Khadem
    Shamsinezhad, Elham
    UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013), 2013, : 717 - 721
  • [22] The Security Risks of Cloud Computing
    Choi, Myeonggil
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 330 - 330
  • [23] Security Issues for Cloud Computing
    Hamlen, Kevin
    Kantarcioglu, Murat
    Khan, Latifur
    Thuraisingham, Bhavani
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 36 - 48
  • [24] Cloud computing : security challenges
    Bouayad, Anas
    Blilat, Asmae
    el Houda Mejhed, Nour
    El Ghazi, Mohammed
    2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST'12), 2012, : 26 - 31
  • [25] Research On Cloud Computing And Security
    Yu, Ting-ting
    Zhu, Ying-Guo
    2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 314 - 316
  • [26] Cloud Computing and Security Measure
    Meetei, Mutum Zico
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 852 - 857
  • [27] Security of Cloud Computing Environment
    Karajeh, Huda
    Maqableh, Mahmoud
    Masa'deh, Ra'ed
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 2202 - 2215
  • [28] Cloud Computing Security: A Survey
    Khalil, Issa M.
    Khreishah, Abdallah
    Azeem, Muhammad
    COMPUTERS, 2014, 3 (01) : 1 - 35
  • [29] Security and Privacy in Cloud Computing
    Tari, Zahir
    IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [30] A Survey on the Security of Cloud Computing
    Alhenaki, Lubna
    Alwatban, Alaa
    Alamri, Bashaer
    Alarifi, Noof
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,