A cloud computing based system for cyber security management

被引:16
|
作者
Xu, Guobin [1 ]
Yu, Wei [1 ]
Chen, Zhijiang [1 ]
Zhang, Hanlin [1 ]
Moulema, Paul [1 ]
Fu, Xinwen [2 ]
Lu, Chao [1 ]
机构
[1] Towson Univ, Dept Comp & Informat Sci, 7800 York Rd, Towson, MD 21252 USA
[2] Univ Massachusetts Lowell, Dept Comp Sci, Lowell, MA 01960 USA
关键词
big data; cloud computing; cyber security management; MapReduce;
D O I
10.1080/17445760.2014.925110
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The exponential increase of cyber security has led to an ever-increasing accumulation of big network data for cyber security applications. The big data analysis for cyber security management presents challenges in data capturing, storing and processing. To address these challenges, in this paper we develop a cloud computing based system for cyber security management to fasten the analysis process of big network data. Our developed system is built on the MapReduce framework and consists of end-user devices, cloud infrastructure and a monitoring centre. To make our proposed system efficient, we introduce two key function modules of our system: data storage module and task scheduling module. We conduct the system implementation using Apache Hadoop, and our implemented system consists of data collection, data normalisation, data computation and data visualisation. Using ranking and aggregation as primitives for performing cyber security management, we conducted extensive experiments to show the effectiveness of our developed system. We also discuss how to extend our proposed system to other applications.
引用
收藏
页码:29 / 45
页数:17
相关论文
共 50 条
  • [1] A Cloud Computing Based Architecture for Cyber Security Situation Awareness
    Yu, Wei
    Xu, Guobin
    Chen, Zhijiang
    Moulema, Paul
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 488 - 492
  • [2] Policy Based Management for Security in Cloud Computing
    Waller, Adrian
    Sandy, Ian
    Power, Eamonn
    Aivaloglou, Efthimia
    Skianis, Charalampos
    Munoz, Antonio
    Mana, Antonio
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 130 - +
  • [3] Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey
    Ahmad, Waqas
    Rasool, Aamir
    Javed, Abdul Rehman
    Baker, Thar
    Jalil, Zunera
    [J]. ELECTRONICS, 2022, 11 (01)
  • [4] Cyber resilience and cyber security issues of intelligent cloud computing systems
    Abdullayeva, Fargana
    [J]. RESULTS IN CONTROL AND OPTIMIZATION, 2023, 12
  • [5] Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing
    Achar, Sandesh
    Faruqui, Nuruzzaman
    Whaiduzzaman, Md
    Awajan, Albara
    Alazab, Moutaz
    [J]. ELECTRONICS, 2023, 12 (08)
  • [6] Cloud computing security in health cyber physical systems
    Morolong, Mamoqenelo P.
    Shava, Fungai Bhunu
    Gamundani, Attlee M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1553 - 1568
  • [7] Scalable Cyber-Security for Terabit Cloud Computing
    Ros-Giralt, Jordi
    Szilagyi, Peter
    Lethin, Richard
    [J]. 2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, : 1607 - 1616
  • [8] Introducing the Information Security Management System in Cloud Computing Environment
    Tot, Laslo
    Grubor, Gojko
    Marta, Takacs
    [J]. ACTA POLYTECHNICA HUNGARICA, 2015, 12 (03) : 147 - 166
  • [9] Designing of Cryptography Based Security System for Cloud Computing
    Sengupta, Nandita
    Holmes, Jeffrey
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 52 - 57
  • [10] Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
    Zhen Chen
    Fuye Han
    Junwei Cao
    Xin Jiang
    Shuo Chen
    [J]. Tsinghua Science and Technology, 2013, 18 (01) : 40 - 50