DocumentCode :
3599902
Title :
Detecting the run time attacks in the cloud with an evidence collection based approach
Author :
Jie Lin ; Chuanyi Liu ; Zhichun Ning ; Binxing Fang
Author_Institution :
Sch. of Comput. Sci., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear :
2014
Firstpage :
514
Lastpage :
518
Abstract :
As the impacts of security threats are amplified and spread quickly in the cloud, especially with the attribute of large-scale virtualization. Most of researches focus on monitoring the network traffic. However, these methods don´t check how the attack happened and what damage the attack caused for the virtual infrastructure. This paper presents a logging method to analyze the potential attacks out of VM and a prototype was implemented. The experimental results show that this method can detect the real world attacks effectively and the performance overhead is acceptable.
Keywords :
cloud computing; security of data; virtual machines; virtualisation; cloud; evidence collection based approach; large-scale virtualization; logging method; network traffic monitoring; performance overhead; run time attack detection; security threats; virtual infrastructure; virtual machine; Binary codes; Computer architecture; Monitoring; Servers; Software; Virtual machining; Virtualization; Cloud; Control; Security; Virtual machine;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing and Intelligence Systems (CCIS), 2014 IEEE 3rd International Conference on
Print_ISBN :
978-1-4799-4720-1
Type :
conf
DOI :
10.1109/CCIS.2014.7175790
Filename :
7175790
Link To Document :
بازگشت