Network Security Evaluation Model Based on Cloud Computing

被引:0
|
作者
Yang, Jin [1 ]
Wang, Cilin [1 ]
Yu, Le [1 ]
Liu, Caiming [1 ]
Peng, Lingxi [1 ]
机构
[1] SW Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
关键词
Cloud Computing; Artificial Immune Systems; Network Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an important innovation in the current computing model. The critical problem of cloud computing faced at present is the security issue. In the current network environment, that relying on a single terminal to check the Trojan virus is considered increasingly unreliable. Based on the correspondence between the artificial immune system antibody and pathogen invasion intensity, this paper is to establish a real-time network risk evaluation model in cloud computing. This paper builds a hierarchical, quantitative measurement indicator system, and a unified evaluation information base and knowledge base. The paper also combines assets evaluation system and network integration evaluation system, considering from the application layer, the host layer, network layer may be factors that affect the network risks. The experimental results show that the new model improves the ability of intrusion detection and prevention than that of the traditional intrusion prevention systems.
引用
下载
收藏
页码:488 / 495
页数:8
相关论文
共 50 条
  • [1] A Complex Network Structure Evaluation Model Based on Cloud Computing
    Ji, Xiaohui
    Xie, Jie
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (06): : 235 - 245
  • [2] A Cloud Computing Security Model Based on Noninterference
    Lü Congdong
    QIAN Gang
    CHEN Tao
    Wuhan University Journal of Natural Sciences, 2019, 24 (03) : 194 - 200
  • [3] Evaluation and Analysis on Security Framework Model of Cloud Computing
    Li, Zhao
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 572 - 578
  • [4] Research on the Network Information Security Based on the Cloud Computing
    Shen, Wei
    2015 2nd International Conference on Education and Education Research (EER 2015), Pt 5, 2015, 9 : 349 - 353
  • [5] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [6] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [7] One quantifiable security evaluation model for cloud computing platform
    Sun, Aobing
    Gao, Guohong
    Ji, Tongkai
    Tu, Xuping
    2018 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2018, : 197 - 201
  • [8] Research on university laboratory network security based on Cloud Computing
    Li, Dan
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023,
  • [9] Design and Implementation of Cloud Computing Network Security Level Protection Evaluation System Based on Python
    Guizhou Branch of National Computer Network and Information Security Management Center, Guizhou Province, Guiyang City
    550003, China
    不详
    562400, China
    Proc SPIE Int Soc Opt Eng, 1600,
  • [10] RESEARCH ON SECURITY EVALUATION OF CLOUD COMPUTING BASED ON ATTACK GRAPH
    Cheng, Yexia
    Du, Yuejin
    Xu, Junfeng
    Yuan, Chunyang
    Xue, Zhi
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 459 - 465