Cloud Network Security Monitoring and Response System

被引:0
|
作者
Mukhtarov, Murat [1 ]
Miloslavskaya, Natalia [1 ]
Tolstoy, Alexander [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Informat Secur Fac, Moscow, Russia
关键词
Cloud computing; Cloud infrastructure; Virtual Infrastructure; Application Hosting; Network Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The public clouds network monitoring and response system, based on flow measurements, open source tools and CSMS (Cloud Security Monitoring System) module, is to be introduced in this paper. The main goal of the research is to develop an algorithm and to implement a system, which automatically detects and makes a response to network anomalies, occurring inside a Cloud infrastructure. In this research is proposed approach of anomaly detection inside the Cloud infrastructure which is based on a profiling method of IPFIX (IP Flow Information Export) protocol data and idea of negative selection principle is used for generating signatures of network anomalies, which are named detectors. The automatic response module makes a decision about network anomalies origin, based on several iterative checks and creates a record on the firewall rules table. The network traffic profiling process automatically generates the firewall rules set for all traffic classes, obtained during the learning process. Main results of the research are development of the algorithms and the way of the monitoring network attacks inside the Cloud. Implementation of the algorithms is python-based script and currently stays under hard-testing phase.
引用
收藏
页码:181 / 185
页数:5
相关论文
共 50 条
  • [41] Network Monitoring in the age of the Cloud
    Ciuffoletti, Augusto
    GRIDS, P2P AND SERVICES COMPUTING, 2010, : 157 - 170
  • [42] Design of network security storage system based on under cloud computing technology
    ThiBac, Do
    Minh, Nguyen Hieu
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
  • [43] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [44] HardWhale: A Hardware-isolated Network Security Enforcement System for Cloud Environments
    You, Myoungsung
    Nam, Jaehyun
    Seo, Hyunmin
    Seo, Minjae
    Kim, Jaehan
    Choi, Dongmin
    Shin, Seungwon
    2024 IEEE 44TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS 2024, 2024, : 496 - 507
  • [45] Network Security Problems and Countermeasures of Hospital Information System after Going to the Cloud
    Gao, Shuming
    COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2022, 2022
  • [46] Network content security monitoring system based on high-speed network for enterprises
    Shi, YF
    Zhao, YP
    Xu, RS
    SERVICE SYSTEMS AND SERVICE MANAGEMENT - PROCEEDINGS OF ICSSSM '04, VOLS 1 AND 2, 2004, : 408 - 410
  • [47] Towards Security Monitoring for Cloud Analytic Applications
    Elsayed, Marwa
    Zulkernine, Mohammad
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 69 - 78
  • [48] Architecture for High Confidence Cloud Security Monitoring
    Kanstren, Teemu
    Lehtonen, Sami
    Savola, Reijo
    Kukkohovi, Hilkka
    Hatonen, Kimmo
    2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, : 195 - 200
  • [49] Data Security Monitoring Platform in Cloud for Enterprise
    Yushui, Geng
    Shunpeng, Pang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 67 - 78
  • [50] Monitoring based security approach for cloud computing
    Yadav A.
    Ritika
    Garg M.L.
    Ingenierie des Systemes d'Information, 2019, 24 (06): : 611 - 617