首页> 外文期刊>Future generation computer systems >A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
【24h】

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

机译:关于云计算中的差距,威胁补救挑战和主动攻击检测的一些想法的调查

获取原文
获取原文并翻译 | 示例
       

摘要

The long-term potential benefits through reduction of cost of services and improvement of business outcomes make Cloud Computing an attractive proposition these days. To make it more marketable in the wider IT user community one needs to address a variety of information security risks. In this paper, we present an extensive review on cloud computing with the main focus on gaps and security concerns. We identify the top security threats and their existing solutions. We also investigate the challenges/obstacles in implementing threat remediation. To address these issues, we propose a proactive threat detection model by adopting three main goals: (i) detect an attack when it happens, (ii) alert related parties (system admin, data owner) about the attack type and take combating action, and (iii) generate information on the type of attack by analyzing the pattern (even if the cloud provider attempts subreption). To emphasize the importance of monitoring cyber attacks we provide a brief overview of existing literature on cloud computing security. Then we generate some real cyber attacks that can be detected from performance data in a hypervisor and its guest operating systems. We employ modern machine learning techniques as the core of our model and accumulate a large database by considering the top threats. A variety of model performance measurement tools are applied to verify the model attack prediction capability. We observed that the Support Vector Machine technique from statistical machine learning theory is able to identify the top attacks with an accuracy of 97.13%. We have detected the activities using performance data (CPU, disk, network and memory performance) from the hypervisor and its guest operating systems, which can be generated by any cloud customer using built-in or third party software. Thus, one does not have to depend on cloud providers' security logs and data. We believe our line of thoughts comprising a series of experiments will give researchers, cloud providers and their customers a useful guide to proactively protect themselves from known or even unknown security issues that follow the same patterns.
机译:通过降低服务成本和改善业务成果而带来的长期潜在利益,使得云计算成为当今有吸引力的提议。为了使它在更广泛的IT用户社区中更具市场竞争力,需要解决各种信息安全风险。在本文中,我们对云计算进行了广泛的回顾,主要关注差距和安全问题。我们确定了主要的安全威胁及其现有解决方案。我们还将调查实施威胁修复的挑战/障碍。为了解决这些问题,我们提出了一个主动的威胁检测模型,它采用了三个主要目标:(i)在攻击发生时进行检测,(ii)向相关方(系统管理员,数据所有者)发出有关攻击类型的警报并采取应对措施, (iii)通过分析模式来生成有关攻击类型的信息(即使云提供商尝试进行子提交)。为了强调监视网络攻击的重要性,我们简要概述了有关云计算安全性的现有文献。然后,我们生成一些可以从虚拟机管理程序及其来宾操作系统中的性能数据检测到的真实网络攻击。我们采用现代机器学习技术作为模型的核心,并通过考虑主要威胁来积累大型数据库。应用了各种模型性能测量工具来验证模型攻击预测能力。我们观察到,基于统计机器学习理论的支持向量机技术能够以97.13%的准确率识别出最高的攻击。我们已经使用来自虚拟机管理程序及其来宾操作系统的性能数据(CPU,磁盘,网络和内存性能)检测到了活动,该数据可以由任何使用内置或第三方软件的云客户生成。因此,不必依赖于云提供商的安全日志和数据。我们相信,由一系列实验组成的思路将为研究人员,云提供商及其客户提供有用的指南,以主动保护自己免受遵循相同模式的已知乃至未知安全问题的侵害。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号