期刊文献+

一种云安全攻击检测与分类方案 被引量:1

Attack Detection and Classification for Cloud Security
下载PDF
导出
摘要 由于云服务提供商不愿向用户提供安全审计报告、日志、安全策略、安全漏洞和安全事故响应机制等相关安全数据,所以在云计算下用户难以发现安全攻击。为此,提出了一种基于机器学习的云安全攻击检测方案。在分析现有攻击场景的基础上,设计了实验数据的采集方案,提取了包括Dos攻击、跨虚拟机的旁路攻击、恶意的内部员工攻击、共享内存攻击和欺诈攻击共五种安全攻击场景数据,并在WEKA下使用支持向量机学习算法对攻击进行了分类实验。结果表明,除欺诈攻击外,对其他四种安全攻击的识别率均达到90%以上。 Since cloud providers are unwilling to provide security related data to its customers, such as auditing, logging, security policies, vulnerability and incident response, cloud users always less knows the details on attacks. Thus, a scheme for attack detection and clas sification using machine learning techniques was proposed here. Firstly current attack scenarios were analyzed. Then, the scheme for collec ting data was designed. These data in five attack scenarios including Dos, Cross VM side channel, malicious insiders, shared memory and ph ishing attack was extracted and classified using support vector machine(SVM). Results show SVM has high level of performance across all classes. Classification rate reaches 90% besides classifying phishing attack(80. 9%).
作者 李宏宇
出处 《计算机与数字工程》 2013年第1期82-84,共3页 Computer & Digital Engineering
关键词 云计算 攻击分类 支持向量机 cloud computing, attack classification, SVM
  • 相关文献

参考文献12

  • 1B. P. Rimal, E. Choi, I.Lumb. A taxonomy and survey of cloud computing systems[C]//Proceedings of the 5Lh interna tional joint conference. Seoul:IEEE, 2009 : 25-27.
  • 2K. Dahbur, B. Mohammad, A.B. Tarakji. A survey of risks, threats and vulnerabilities in cloud computing[C]//Proceedings of the 2011 international conference on intelligent semantic web services and applications. New York: ACM,2011:31-43.
  • 3T. Ristenpart, E. Tromer, H. Shacham. exploring informa tion leakage in third-party compute clodus[C]//Proceedings of the 16th ACM conference on computer and communications se curity. New York: ACM, 2009 : 199-212.
  • 4F. Rocha, M. Correia. Lucy in the sky without diamonds: stealing confidential data in the cloud[C]//Proceedings of the 41st international conference. Hong Kong= IEEE, 2011: 129- 134.
  • 5A. Chonka, Y. Xiang, W. Zhou. Cloud securtiy defence to protect cloud computing against HTTP Dos and XML-Dos at- tacks [J]. Journal of Network and computer Applications, 2011,34(4):1097-1107.
  • 6D. Danchev. mind streams of information security knowledge [EB/OL]. http://ddanchev, blogspot, corn/, 2009.
  • 7J. Grossman. Cross-site scripting worms and viruses, White hat Security [EB/OL]. https://www, whitehatsec, corn/as sets/WPSCSS0607, pdf, 2007.
  • 8J. Grossman. Hacking intranet websitcs from the outside[EB/ OL]. http..//www, blackhat, com/presentations/bh usa 07/ Grossman/Presemation/bh-usa-O7-grossman. pdf, 2007.
  • 9M. McDowell. Understanding denial-of-service attacks[EB/ OL]. http://www, us cert. gov/cas/tips/ST04 015. hlml, 2009.
  • 10R. MeMillan. Researchers find a new way lo attack the cloud [ EB/OL]. http://www, eomputerworld, eom/s/arfiele/ 9137507/Researchers, 2011.

二级参考文献7

共引文献9

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部