3D-IDS: IaaS user-oriented Intrusion Detection System

被引:10
|
作者
He, Jie [2 ]
Tang, Chuan [3 ]
Yang, Yuexiang [2 ]
Qiao, Yong [2 ]
Liu, Chaobin [1 ]
机构
[1] Second Mil Med Univ, Informat Ctr, Shanghai, Peoples R China
[2] Natl Univ Def Technol, Sch Comp, Changsha, Hunan, Peoples R China
[3] Natl Univ Def Technol, Informat Ctr, Changsha, Hunan, Peoples R China
关键词
Cloud Computing; IaaS; Virtualization Security; Intrusion Detection;
D O I
10.1109/ISISE.2012.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Being the core technology of IaaS (Infrastructure as a Service) cloud computing data center, server virtualization can virtualize servers with surplus resources to multiple virtual machines with diverse configurations according to users' demands. This can significantly improve the utilization of computing resources. Traditional intrusion detection techniques are no longer suitable for security detection of IaaS cloud computing data centers any more due to the specificity of IaaS architecture. Furthermore, most current intrusion detection systems (IDS) for cloud environment are provider-oriented. It's hard for IaaS users to obtain the statuses of virtual machines rented by them. In this paper, we designed a three-dimensional intrusion detection system (3D-IDS). Through a distributed collection of information on virtual machines, such as system logs, host behaviors and network behaviors, our system can synthesize related information to supply detailed security statuses of each virtual machine for IaaS users.
引用
收藏
页码:12 / 15
页数:4
相关论文
共 50 条
  • [1] 3D-IDS: Doubly Disentangled Dynamic Intrusion Detection
    Qiu, Chenyang
    Geng, Yingsheng
    Lu, Junrui
    Chen, Kaida
    Zhu, Shitong
    Su, Ya
    Nan, Guoshun
    Zhang, Can
    Fu, Junsong
    Cui, Qimei
    Tao, Xiaofeng
    [J]. PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 1965 - 1977
  • [2] An ontology-based network intrusion detection system: A user-oriented approach
    Hung, Shao-Shin
    Liu, Damon Shing-Min
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 722 - 723
  • [3] A user-oriented ontology-based approach for network intrusion detection
    Hung, Shao-Shin
    Liu, Damon Shing-Min
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 78 - 88
  • [4] A User-Oriented Approach Toward Price Prediction for IaaS Service
    Zhang, Jie
    Xie, Jian
    Yuan, Min
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2018), 2018, : 343 - 346
  • [5] A COMPUTER USER-ORIENTED SYSTEM
    MONTILLON, GD
    [J]. COMMUNICATIONS OF THE ACM, 1965, 8 (02) : 117 - +
  • [6] Study on 3D-IDS Based Spacecraft Development Mode
    Zhou Xiaolun
    Chen Haifeng
    Hao Ganggang
    Luo Cheng
    Zhu Wei
    [J]. 2019 5TH ASIA CONFERENCE ON MECHANICAL ENGINEERING AND AEROSPACE ENGINEERING (MEAE 2019), 2019, 288
  • [7] AN EXPERIMENT IN A USER-ORIENTED COMPUTER SYSTEM
    KLERER, M
    MAY, J
    [J]. COMMUNICATIONS OF THE ACM, 1964, 7 (05) : 290 - 294
  • [8] USER-ORIENTED PROJECT ACCOUNTING SYSTEM
    HESS, LG
    ALCORN, LS
    [J]. SRA-JOURNAL OF THE SOCIETY OF RESEARCH ADMINISTRATORS, 1990, 21 (04): : 31 - 41
  • [9] A user-oriented comparison of the techniques for 3D spectroscopy
    Alighieri, S. di Serego
    [J]. SCIENCE PERSPECTIVES FOR 3D SPECTROSCOPY, 2007, : 45 - 49
  • [10] AT LAST, A USER-ORIENTED SYSTEM - LEXIS
    ABRAMOWITZ, D
    [J]. PROCEEDINGS OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1975, 12 : 125 - 126