Towards Design of Security Monitoring Systems via Introspection in Cloud Computing

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 537

This Paper With 9 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CEAE01_104

تاریخ نمایه سازی: 14 مرداد 1394

Abstract:

Design and implementation of security systems is an important issue in computer science, and it has attracted much attention in both commercial and academic spheres. Cloud computing is one of the fastest growing segment of the IT industry. In these environments, security monitoring is a critical requirement. Nowadays, there are many security systems. But, one of the shortcomings is that, most of security monitoring systems may be tempered by attackers. That’s why these systems should be installed on the monitored machine. Hence, traditional security monitoring systems will be vulnerable against new attacks. This issue leads to unstable systems and bogus reports. On the other hands, existent security monitoring tools were not originally designed for cloud environments. In this paper, we discuss traditional security monitoring systems and their weaknesses, and present introspection as a solution in design of these systems. We offer a security monitoring architecture via introspection. Then, we consider emerged problems by usage this technology.

Authors

Masoudeh Keshavarzi

Department of Computer PNU

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • _ _ on gaps, _ and _ Future ...
  • _ _ i _ _ The NIST definition _ Retrieved ...
  • Hassan Takabi, James B. D. Joshi and Gail-oon Ahn, "Security ...
  • _ _ _ _ _ _ challenges in cloud computine ...
  • _ _ _ _ Future _ ...
  • Cloudwatch: http ://aws _ _ , c om/c loudwatch/. ...
  • Logicmonitor: http ://www. logicmonitor. com/. ...
  • S. Nanda, T. Chiueh, A survey on virtualization technologies, Technical ...
  • J.E. Smith, R. Nair, The architecture of virtual machines, IEEE ...
  • M. Rosenblum, T. Garfinkel, Virtual machine monitors: current technology and ...
  • T. Garfinkel and M. Rosenblum, _ virtual machine introspection based ...
  • Robert P. Goldberg. Survey of Virtual Machine Research. IEEE Computer, ...
  • _ _ _ Requirements _ Features. In The Sevent ...
  • R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, ...
  • _ _ Eun-Ha, Jeong Young-Si, Efficient server virtualization usie grid ...
  • J. Pfoh, C. Schneider, and C. Eckert. A Formal Model ...
  • _ _ _ _ _ _ Xen _ ...
  • _ _ _ _ monitoring of virtd machines, in: 23rd ...
  • P. M. Chen and B. D. Noble. When virtual is ...
  • R.L. Krutz, R.D. Vines, Cloud Security: A Comprehensive Guide to ...
  • D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future ...
  • _ _ _ virtualization security assurance achitecture for gret cloud ...
  • L.M. Vaquero, L. Rodero-Merino, D. Morn, Locking the sky: a ...
  • _ _ _ _ _ _ _ reconstruction, " in ...
  • _ _ _ _ _ , " in Proceedings of ...
  • _ _ _ Tracking processe in a virtual machine sbvirommen? ...
  • _ _ _ _ extensions, " in Proceedings of te ...
  • _ _ _ _ _ _ _ 1 _ 7th ...
  • نمایش کامل مراجع