Security event correlation approach for cloud computing

被引:0
|
作者
机构
[1] Ficco, Massimo
来源
Ficco, M. (massimo.ficco@unina2.it) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 07期
关键词
Architectural levels - Complex event processing - Distributed security - Event correlation - New business models - Prototype implementations - Public organisation - Security;
D O I
10.1504/IJHPCN.2013.056525
中图分类号
学科分类号
摘要
Cloud computing is a new business model, which represents an opportunity for users, companies, and public organisations to reduce costs and increase efficiency, as well as an alternative way for providing services and resources. In this pay-by-use model, security plays a key role. Cyber attacks are a serious danger, which can compromise the quality of the service delivered to the customers, as well as the costs of the provided cloud resources and services. In this paper, a hybrid and hierarchical event correlation approach for intrusion detection in cloud computing is presented. It consists of detecting intrusion symptoms by collecting diverse information at several cloud architectural levels, using distributed security probes, as well as performing complex event analysis based on a complex event processing engine. The escalation process from intrusion symptoms to the identified cause and target of the intrusion is driven by a knowledge-base represented by an ontology. A prototype implementation of the proposed intrusion detection solution is also presented. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
相关论文
共 50 条
  • [41] Analysis on the Security of Cloud Computing
    He Zhonglin
    He Yuhua
    PIAGENG 2010: PHOTONICS AND IMAGING FOR AGRICULTURAL ENGINEERING, 2010, 7752
  • [42] Security Issues In Cloud Computing
    Tianfield, Huaglory
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1082 - 1089
  • [43] Hindrances in the Security of Cloud Computing
    Nanda, Mehul
    Tyagi, Aakarsh
    Saxena, Karan
    Chauhan, Neeru
    2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 193 - 198
  • [44] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [45] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [46] Cloud Computing Security and Future
    Kopacz, Patrick
    Chowdhury, Md Minhaz
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 264 - 269
  • [47] Challenges and Security in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 214 - 217
  • [48] A Research on Cloud Computing Security
    Zhang, Ni
    Liu, Di
    Zhang, Yun-Yong
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 370 - 373
  • [49] Cloud Computing: Security Risk
    Sumter, La'Quata
    PROCEEDINGS OF THE 48TH ANNUAL SOUTHEAST REGIONAL CONFERENCE (ACM SE 10), 2010, : 490 - 493
  • [50] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,