Secure Cloud Computing: Continuous Anomaly Detection Approach in Legal Metrology

被引:0
|
作者
Oppermann, Alexander [1 ]
Toro, Federico Grasso [1 ]
Thiel, Florian [1 ]
Seifert, Jean-Pierre [2 ]
机构
[1] Physikal Tech Bundesanstalt PTB, Dept Metrol IT 85, Berlin, Germany
[2] Tech Univ Berlin, Secur Telecommunicat, Berlin, Germany
关键词
Anomaly Detection; Continuous Monitoring; Secure Cloud Computing; Anomaly Detection as a Service; Distributed Computing; Legal Metrology;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the field of Legal Metrology, it shall be assured that all measurements are carried out by a trusted computer system. Securing Computer Systems, especially in a distributed environment can be a challenging task to comply, since, in such an environment, a measurement instrument cannot be simply disconnected to guarantee its security. Following the approach of continuous monitoring to derive a normal system behavior can ensure continuous anomaly detection to satisfy the needed demands of Legal Metrology. The proposed Anomaly Detection approach measures the severity of the detected incident and places it into three different categories: green, yellow and red. The presented module can detect attacks against distributed applications in a cloud computing environment, using pattern recognition techniques for clustering, as well as statistical approaches. Both, inexperienced and experienced attacks have been tested and results are presented.
引用
收藏
页码:1831 / 1836
页数:6
相关论文
共 50 条
  • [21] Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing
    Moustafa, Nour
    Creech, Gideon
    Sitnikova, Elena
    Keshk, Marwa
    2017 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2017,
  • [22] Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems
    Huang, Chengqiang
    Min, Geyong
    Wu, Yulei
    Ying, Yiming
    Pei, Ke
    Xiang, Zuochang
    IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (01) : 60 - 72
  • [23] Design of the Network Traffic Anomaly Detection System in Cloud Computing Environment
    Zhang, Long
    Wang, Jinsong
    Lin, Sheng
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 16 - 19
  • [24] Performance Metric Selection for Autonomic Anomaly Detection on Cloud Computing Systems
    Fu, Song
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [25] An LOF-based Adaptive Anomaly Detection Scheme for Cloud Computing
    Huang, Tian
    Zhu, Yan
    Zhang, Qiannan
    Zhu, Yongxin
    Wang, Dongyang
    Qiu, Meikang
    Liu, Lei
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 206 - 211
  • [26] A hybrid approach to secure and compress data streams in cloud computing environment
    Abdo, A.
    Karamany, Taghreed S.
    Yakoub, Ahmed
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (03)
  • [27] A Secure Software Framework for Measuring Instruments in Legal Metrology
    Peters, Daniel
    Thiel, Florian
    Peter, Michael
    Seifert, Jean-Pierre
    2015 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2015, : 1596 - 1601
  • [28] A Secure System Architecture for Measuring Instruments in Legal Metrology
    Peters, Daniel
    Peter, Michael
    Seifert, Jean-Pierre
    Thiel, Florian
    COMPUTERS, 2015, 4 (02) : 61 - 86
  • [29] Cloud Computing Legal Issues
    Mirzaoglu, A.
    ICECCO'12: 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION, 2012, : 256 - 261
  • [30] Trust Management Approach for Secure and Privacy Data Access in Cloud Computing
    Mythili, K.
    Anandakumar, H.
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 923 - 927