期刊文献+

基于用户异常等级的虚拟机动态防御等级配置策略 被引量:1

CONFIGURATION STRATEGY OF DYNAMIC DEFENSE LEVELS FOR VIRTUAL MACHINE BASED ON USER ABNORMAL LEVEL
下载PDF
导出
摘要 云计算环境下,开放的运行环境使其面临重大的安全挑战,传统的入侵检测系统已经不能完全适合云计算等新型计算网络环境。鉴于终端用户的可信性对虚拟机可信性的影响,利用动态的行为可信性机制和社会信任的思想,提出一种基于用户异常等级的虚拟机防御等级动态配置策略。首先,利用滑动窗口行为评估机制评估用户行为,然后根据评估结果将用户所在的虚拟机划分为不同安全等级域,最后,通过分域规则链机制实现虚拟机安全等级的动态配置,有效提高入侵检测系统的效率。模拟实验表明,提出的多等级的防御机制具有良好的可靠性。 Cloud computing is facing severe safety challenges because of its open operation environment.Traditional instruction detection system (IDS)can no longer fully adapt to new computing network environment,such as cloud computing.In view of that the end-user’s credibility has significant impact on the credibility of virtual machine,we present a user abnormal level-based dynamic configuration strategy of defense levels for virtual machines by making use of the credibility mechanism of dynamic behaviour and the idea of social trust.First,the strategy uses sliding window-based behaviour assessment mechanism to assess user’s behaviour,then based on the assessment result it divides the virtual machine the user located into different safety level domains.At last,it realises the dynamic configuration of safety levels of virtual machine through domain division rules chain,which greatly improves the efficiency of IDS.Simulation experiment shows that the proposed multi-level defense mechanism has good reliability.
出处 《计算机应用与软件》 CSCD 2015年第6期272-277,295,共7页 Computer Applications and Software
基金 国家自然科学基金项目(61363003) 广西自然科学基金项目(2012GXNSFAA053222) 广西高校优秀人才计划项目([2011]40) 广西科学研究与技术开发计划项目(桂科攻13480207)
关键词 云计算 入侵检测系统 用户异常等级 Cloud computing Intrusion detection system User abnormal level
  • 相关文献

参考文献15

  • 1Subanshini S,Kavitha V.A survey on security issues in service delivery models of cloud computing[J].Journal of Network and Computer Applications,2011,34(1):1-11.
  • 2Lee J H,Park M W,Eom J H,et al.Multi-level Intrusion Detection System and Log Management in Cloud Computing[C]//Proceedings of the13thInternational Conference on Advanced Communication Technology.Washington DC:IEEE Computer Society,2011:552-555.
  • 3F-Secure Corporation.F-Secure Linux Security[EB/OL].2010-08-03(2012).http://www.f-secure.co-m/linux-weblog/F-Secure Corporation.
  • 4Sourcefire.Snort IDS[EB/OL].2010-10-05(2011).http://www.snort.org/.
  • 5Garfinkel T,Rosenblum M.A virtual machine introspection based architecture for intrusion detection[C]//Proceedings of the 10thNetwork and Distributed System Security Symposium.Berkeley:USENIX Association,2003:191-206.
  • 6Jansen B,Ramasamy H,Schunter M.Architecting dependable and secure systems using virtualization[M].Architecting Dependable Systems V.Heidelberg:Springer Verlag,2008:124-149.
  • 7Hisham A Kholidy,Abdelkarim Erradi,Sherif Abdelwahed,et al.HACIDS:A Hierarchical and Autonomous IDS for Cloud Systems[C]//Proceedings of the 5thInternational Conference on Computational Intelligence.Washington DC:IEEE Computer Society,2013:179-184.
  • 8Lin Chihhung,Tien Chinwei,Pao Hsingkuo.Efficient and Effective NIDS for Cloud Virtualization Environment[C]//Proceedings of the4thInternational Conference on Cloud Computing Technology and Science.Washington DC:IEEE Computer Society,2012:248-254.
  • 9Sebastian Roschke,Feng Cheng,Christoph Meinel.Intrusion Detection in the Cloud[C]//Proceedings of the 8thIEEE International Conference on Dependabl.Washington DC:IEEE Computer Society,2009:729-734.
  • 10European Network And Information Security Agency(Enisa).Cloud Computing Risk Assessment[EB/OL].2009-11-09(2011).http://en-isa.europa.eu.

二级参考文献44

共引文献86

同被引文献17

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部