A Fingerprinting System Calls Approach for Intrusion Detection in a Cloud Environment
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27740%2F12%3A86084780" target="_blank" >RIV/61989100:27740/12:86084780 - isvavai.cz</a>
Výsledek na webu
<a href="http://dx.doi.org/10.1109/CASoN.2012.6412420" target="_blank" >http://dx.doi.org/10.1109/CASoN.2012.6412420</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/CASoN.2012.6412420" target="_blank" >10.1109/CASoN.2012.6412420</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
A Fingerprinting System Calls Approach for Intrusion Detection in a Cloud Environment
Popis výsledku v původním jazyce
Cloud Computing envisioned as the next generation architecture for IT enterprises, has proliferated itself due to the advantages it provides. Cloud Computing provides solutions for carrying out efficient, scalable and low cost computing. Due to the distributed nature of cloud based system, it is vulnerable to a large category of attacks out of which VM based attacks are most common. To counter these attacks we need Intrusion Detection System (IDS), which is used to monitor network traffic and policy violations from unauthorized users. Anomaly Detection is a technique of Intrusion Detection, which is used to detect intrusions by monitoring system activity and finding out patterns that do not comply with the normal behavior. In this paper an approach foranomaly detection in cloud environment is presented, which is based upon analysis of system call sequences generated by the virtual machines to the hypervisor. Our proposed implementation prevents malicious VM users to modify well known
Název v anglickém jazyce
A Fingerprinting System Calls Approach for Intrusion Detection in a Cloud Environment
Popis výsledku anglicky
Cloud Computing envisioned as the next generation architecture for IT enterprises, has proliferated itself due to the advantages it provides. Cloud Computing provides solutions for carrying out efficient, scalable and low cost computing. Due to the distributed nature of cloud based system, it is vulnerable to a large category of attacks out of which VM based attacks are most common. To counter these attacks we need Intrusion Detection System (IDS), which is used to monitor network traffic and policy violations from unauthorized users. Anomaly Detection is a technique of Intrusion Detection, which is used to detect intrusions by monitoring system activity and finding out patterns that do not comply with the normal behavior. In this paper an approach foranomaly detection in cloud environment is presented, which is based upon analysis of system call sequences generated by the virtual machines to the hypervisor. Our proposed implementation prevents malicious VM users to modify well known
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
<a href="/cs/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: Centrum excelence IT4Innovations</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2012
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of the 2012 4th International Conference on Computational Aspects of Social Networks, CASoN 2012 : 21 ? 23 November 2012, S?o Carlos, Brazil
ISBN
978-1-4673-4793-8
ISSN
—
e-ISSN
—
Počet stran výsledku
6
Strana od-do
309-314
Název nakladatele
IEEE
Místo vydání
New York
Místo konání akce
Sao Carlos
Datum konání akce
21. 11. 2012
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—