Towards Design of Security Monitoring Systems via Introspection in Cloud Computing
Publish place: International Conference on Engineering, Art and Environment
Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 537
This Paper With 9 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
CEAE01_104
تاریخ نمایه سازی: 14 مرداد 1394
Abstract:
Design and implementation of security systems is an important issue in computer science, and it has attracted much attention in both commercial and academic spheres. Cloud computing is one of the fastest growing segment of the IT industry. In these environments, security monitoring is a critical requirement. Nowadays, there are many security systems. But, one of the shortcomings is that, most of security monitoring systems may be tempered by attackers. That’s why these systems should be installed on the monitored machine. Hence, traditional security monitoring systems will be vulnerable against new attacks. This issue leads to unstable systems and bogus reports. On the other hands, existent security monitoring tools were not originally designed for cloud environments. In this paper, we discuss traditional security monitoring systems and their weaknesses, and present introspection as a solution in design of these systems. We offer a security monitoring architecture via introspection. Then, we consider emerged problems by usage this technology.
Keywords:
Authors
Masoudeh Keshavarzi
Department of Computer PNU
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :