The Network Perspective of Cloud Security

被引:0
|
作者
Pierazzi, Fabio [1 ]
Balboni, Andrea [1 ]
Guido, Alessandro [1 ]
Marchetti, Mirco [1 ]
机构
[1] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, Modena, Italy
关键词
Security analytics; Cloud security; Cloud alerts; Temporal characterization;
D O I
10.1109/NCCA.2015.21
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing paradigm has become really popular, and its adoption is constantly increasing. Hence, also network activities and security alerts related to cloud services are increasing and are likely to become even more relevant in the upcoming years. In this paper, we propose the first characterization of real security alerts related to cloud activities and generated by a network sensor at the edge of a large network environment over several months. Results show that the characteristics of cloud security alerts differ from those that are not related to cloud activities. Moreover, alerts related to different cloud providers exhibit peculiar and different behaviors that can be identified through temporal analyses. The methods and results proposed in this paper are useful as a basis for the design of novel algorithms for the automatic analysis of cloud security alerts, that can be aimed at forecasting, prioritization, anomaly and state-change detection.
引用
收藏
页码:75 / 82
页数:8
相关论文
共 50 条
  • [21] Network security protection technology for a cloud energy storage network controller
    Tao Yan
    Jialiang Liu
    Qianqian Niu
    Jizhong Chen
    Shaohua Xu
    Meng Niu
    [J]. Global Energy Interconnection, 2020, 3 (01) : 86 - 98
  • [22] Resource Specific Security Implementation in Network and Cloud System
    Kumar, Latesh K. J.
    Leena, H. U.
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (04): : 458 - 475
  • [23] Research on the Security of Computer Network under Cloud Computing
    Luo, Lei
    Ge, Wei
    [J]. PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 278 - 281
  • [24] Using Cloud Computing to Implement a Security Overlay Network
    Salah, Khaled
    Alcaraz Calero, Jose M.
    Zeadally, Sherali
    Al-Mulla, Sameera
    Alzaabi, Mohammed
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (01) : 44 - 53
  • [25] Network security intrusion target detection system in the cloud
    Srirangam, Durga Prasad
    Salina, Adinarayana
    Bapu, B. R. Tapas
    Partheeban, N.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05)
  • [26] Improving Network Security Through SDN in Cloud Scenarios
    Seeber, Sebastian
    Rodosek, Gabi Dreo
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2014, : 376 - 381
  • [27] A Novel Privacy and Security Framework for the Cloud Network Services
    Singh, Irish
    Mishra, Kamta Nath
    Alberti, Antonio M.
    Jara, Antonio
    Singh, Dhananjay
    [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 363 - 367
  • [28] Cloud Implications on Software Network Structure and Security Risks
    August, Terrence
    Niculescu, Marius Florin
    Shin, Hyoduk
    [J]. INFORMATION SYSTEMS RESEARCH, 2014, 25 (03) : 489 - 510
  • [29] Network Security Threats and Cloud Infrastructure Services Monitoring
    Mukhtarov, Murat
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    [J]. PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 141 - 145
  • [30] A Novel Privacy and Security Framework for the Cloud Network Services
    Singh, Irish
    Mishra, K. N.
    Alberti, Antonio M.
    Singh, Dhananjay
    Jara, Antonio
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 301 - 305