首页> 外文期刊>International journal of computer science and network security >Visualization in Intrusion Detection Systems:A Study on Different Approaches for Cloud Computing Environments
【24h】

Visualization in Intrusion Detection Systems:A Study on Different Approaches for Cloud Computing Environments

机译:入侵检测系统中的可视化:云计算环境的不同方法研究

获取原文
获取原文并翻译 | 示例
           

摘要

This article presents an overview of some of the major works that focus on the use of virtualization in intrusion detection systems to protect against threats in cloud computing environments. The elasticity and abundant availability of computational resources are attractive to attackers in order to exploit vulnerabilities of the cloud, and launch attacks against legitimate users to gain access to private and privileged data. To effectively protect the cloud users, an IDS should have the ability to expand, increase or rapidly decrease the quantity of sensors according to the quantity of resources, as well as the ability to isolate access to the system levels and infrastructures. For this purpose, characteristics of virtual machines as quick startup, fast recovery, stop, migration between different hosts and execution across multiple platforms can be exploited in VM-based IDS, making it a great alternative for monitoring intrusions in cloud computing environments.
机译:本文概述了一些主要工作,这些工作侧重于在入侵检测系统中使用虚拟化来防御云计算环境中的威胁。攻击者可以利用计算资源的弹性和丰富的可用性来利用云的漏洞,并对合法用户发起攻击,以获取对私有和特权数据的访问权限。为了有效地保护云用户,IDS应该具有根据资源数量来扩展,增加或快速减少传感器数量的能力,以及隔离对系统级别和基础架构的访问的能力。为此,可以在基于VM的IDS中利用虚拟机的快速启动,快速恢复,停止,在不同主机之间迁移以及跨多个平台执行等特性,使其成为监视云计算环境中入侵的理想选择。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号