Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure

被引:0
|
作者
Kim, Taehyun [1 ]
Choi, Yeongrak [1 ]
Han, Seunghee [1 ,2 ]
Chung, Jae Yoon
Hyun, Jonghwan [1 ]
Li, Jian [1 ]
Hong, James Won-Ki [1 ]
机构
[1] POSTECH, Div IT Convergence Engn, Pohang, South Korea
[2] Network Technol Lab, Daejeon, South Korea
基金
新加坡国家研究基金会;
关键词
Mobile cloud computing; mobile cloud infrastructure; mobile cloud service scenarios; abnormal behavior monitoring; machine learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several mobile services are changing to cloud-based mobile services with richer communications and higher flexibility. We present a new mobile cloud infrastructure that combines mobile devices and cloud services. This new infrastructure provides virtual mobile instances through cloud computing. To commercialize new services with this infrastructure, service providers should be aware of security issues. In this paper, we first define new mobile cloud services through mobile cloud infrastructure and discuss possible security threats through the use of several service scenarios. Then, we propose a methodology and architecture for detecting abnormal behavior through the monitoring of both host and network data. To validate our methodology, we injected malicious programs into our mobile cloud test bed and used a machine learning algorithm to detect the abnormal behavior that arose from these programs.
引用
收藏
页码:1303 / 1310
页数:8
相关论文
共 50 条
  • [21] An Efficient Method for Detecting Abnormal Electricity Behavior
    Tang, Chao
    Qin, Yunchuan
    Liu, Yumeng
    Pi, Huilong
    Tang, Zhuo
    ENERGIES, 2024, 17 (11)
  • [22] Detecting and Mitigating Storm Attacks in Mobile Access to the Cloud
    Pavloski, Mihajlo
    2019 IEEE INTERNATIONAL CONFERENCE ON FOG COMPUTING (ICFC 2019), 2019, : 53 - 58
  • [23] Distributed Monitoring of Smart Buildings with Cloud Backend Infrastructure
    Stamatescu, Iulia
    Bolboaca, Valeria
    Stamatescu, Grigore
    2018 5TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2018, : 1035 - 1039
  • [24] Network Security Threats and Cloud Infrastructure Services Monitoring
    Mukhtarov, Murat
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 141 - 145
  • [25] Fusing infrastructure health monitoring data in point cloud
    Luleci, Furkan
    Chi, Jiapeng
    Cruz-Neira, Carolina
    Reiners, Dirk
    Catbas, F. Necati
    AUTOMATION IN CONSTRUCTION, 2024, 165
  • [26] A Cloud Infrastructure for Health Monitoring in Emergency Response Scenarios
    Orro, Alessandro
    Geminiani, Gian Angelo
    Sicurello, Francesco
    Modica, Marcello
    Pegreffi, Francesco
    Neri, Luca
    Augello, Antonio
    Botteghi, Matteo
    Sensors, 2024, 24 (21)
  • [27] Cloud Infrastructure and Monitoring System for Real Estate Registration
    Jin, Baoxuan
    Song, Weiwei
    Zhao, Kang
    Li, Shihua
    Wang, Zifu
    2018 26TH INTERNATIONAL CONFERENCE ON GEOINFORMATICS (GEOINFORMATICS 2018), 2018,
  • [28] Interoperable Infrastructure for Flood Monitoring: SensorWeb, Grid and Cloud
    Kussul, Nataliia
    Mandl, Dan
    Moe, Karen
    Mund, Jan-Peter
    Post, Joachim
    Shelestov, Andrii
    Skakun, Sergii
    Szarzynski, Joerg
    Van Langenhove, Guido
    Handy, Matthew
    IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2012, 5 (06) : 1740 - 1745
  • [29] CLOUD-BASED CYBER INFRASTRUCTURE FOR BRIDGE MONITORING
    Jeong, Seongwoon
    Hou, Rui
    Lynch, Jerome P.
    Sohn, Hoon
    Law, Kincho H.
    FUNDAMENTAL RESEARCH IN STRUCTURAL ENGINEERING: RETROSPECTIVE AND PROSPECTIVE, VOLS 1 AND 2, 2016, : 252 - 257
  • [30] A Study on Structure for Monitoring and Detecting VoIP Abnormal Traffic
    Lee, Chang-Yong
    Kim, Hwan-Kuk
    Ko, Kyoung-Hee
    Kim, Jeong-Wook
    Jeong, Hyun-Cheol
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 674 - 678