Security event correlation approach for cloud computing

被引:0
|
作者
机构
[1] Ficco, Massimo
来源
Ficco, M. (massimo.ficco@unina2.it) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 07期
关键词
Architectural levels - Complex event processing - Distributed security - Event correlation - New business models - Prototype implementations - Public organisation - Security;
D O I
10.1504/IJHPCN.2013.056525
中图分类号
学科分类号
摘要
Cloud computing is a new business model, which represents an opportunity for users, companies, and public organisations to reduce costs and increase efficiency, as well as an alternative way for providing services and resources. In this pay-by-use model, security plays a key role. Cyber attacks are a serious danger, which can compromise the quality of the service delivered to the customers, as well as the costs of the provided cloud resources and services. In this paper, a hybrid and hierarchical event correlation approach for intrusion detection in cloud computing is presented. It consists of detecting intrusion symptoms by collecting diverse information at several cloud architectural levels, using distributed security probes, as well as performing complex event analysis based on a complex event processing engine. The escalation process from intrusion symptoms to the identified cause and target of the intrusion is driven by a knowledge-base represented by an ontology. A prototype implementation of the proposed intrusion detection solution is also presented. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
相关论文
共 50 条
  • [31] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [33] Performance and security in cloud computing
    Weizhong Qiang
    The Journal of Supercomputing, 2019, 75 : 1 - 3
  • [34] Performance and security in cloud computing
    Qiang, Weizhong
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 1 - 3
  • [35] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [36] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [37] Security Concerns in Cloud Computing
    Kaur, Puneet Jai
    Kaushal, Sakshi
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 103 - 112
  • [38] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [39] CLOUD COMPUTING SECURITY ISSUES
    Solanki, Shubhankar
    Khan, Wasim
    Arora, Harshit
    Jain, Anupriya
    IIOAB JOURNAL, 2019, 10 (02) : 43 - 48
  • [40] Security Concerns in Cloud Computing
    Khalil, Issa M.
    Khreishah, Abdallah
    Bouktif, Salah
    Ahmad, Azeem
    PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 411 - 416