Network Security Threats and Cloud Infrastructure Services Monitoring

被引:0
|
作者
Mukhtarov, Murat [1 ]
Miloslavskaya, Natalia [1 ]
Tolstoy, Alexander [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Informat Secur Fac, Moscow, Russia
关键词
Cloud computing; Infrastructure as a Service; Virtual Infrastructure; Application Hosting; Network Security;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Today Cloud Computing and virtual infrastructure are one of the most popular ways to deploy application hosting and web-farm platforms. Cloud Infrastructure services also known as "Infrastructure as a Service" (IaaS) are the way to deliver computer infrastructure, typically virtual environment as a service. Distributed nature of IaaS and likelihood that different customers can use the same server and network deliver new security threats. Security of open source platforms of Cloud Services is discussed. Threats that impact on availability components of platform and customer separation features are shown. The distributed way of network security monitoring of availability and integrity of IaaS is described.
引用
收藏
页码:141 / 145
页数:5
相关论文
共 50 条
  • [1] A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
    Lee, Changsoo
    Jung, Daewon
    Lee, Keunwang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 21 - 29
  • [2] Barriers and Drivers to Adoption of Cloud Infrastructure Services: A Security Perspective
    Townsend, Michael
    Wimmer, Hayden
    Du, Jie
    [J]. 2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, : 284 - 290
  • [3] Security Policy Specification Templates for Critical Infrastructure Services in the Cloud
    Rudolph, Manuel
    Schwarz, Reinhard
    Jung, Christian
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 61 - 66
  • [4] Cloud Infrastructure Security
    Velev, Dimiter
    Zlateva, Plamena
    [J]. OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 140 - +
  • [5] SECURITY THREATS AND ATTACKS IN CLOUD
    Mohammed, Asma
    Al Khathami, Jamilah
    Alhakami, Wajdi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (01): : 184 - 191
  • [6] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [7] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [8] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [9] Understanding threats in a cloud infrastructure with no hypervisor
    de Souza, William A. R.
    Tomlinson, Allan
    [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 128 - 133
  • [10] Cloud Network Security Monitoring and Response System
    Mukhtarov, Murat
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    [J]. THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012), 2012, : 181 - 185