2013
DOI: 10.1002/cpe.3166
|View full text |Cite
|
Sign up to set email alerts
|

CloudMon: a resource‐efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances

Abstract: The networked intrusion detection system virtual appliance (NIDS-VA), also known as virtualized NIDS, plays an important role in the protection and safeguard of IaaS cloud environments. However, it is nontrivial to guarantee both of the performance of NIDS-VA and the resource efficiency of cloud applications because both are sharing computing resources in the same cloud environment. To overcome this challenge and trade-off, we propose a novel system, named CloudMon, which enables dynamic resource provision and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…We slightly modify the permission assignment part of iVIC to implement type‐to‐role assignment and type‐type permission matrix. Because both malware detection and intrusion detection are supported in iVIC, we take their results as event input to drive our permission transition model. KVM is used as the underlying virtualization infrastructure of iVIC.…”
Section: Methodsmentioning
confidence: 99%
“…We slightly modify the permission assignment part of iVIC to implement type‐to‐role assignment and type‐type permission matrix. Because both malware detection and intrusion detection are supported in iVIC, we take their results as event input to drive our permission transition model. KVM is used as the underlying virtualization infrastructure of iVIC.…”
Section: Methodsmentioning
confidence: 99%
“…We slightly modify the permission assignment part of iVIC to implement Type-to-Role assignment and TypeType permission matrix. Since both malware detection [8] and intrusion detection [9] are supported in iVIC, we take the results of both of them as event input to drive our permission transition model. KVM is used as the underlying virtualization infrastructure of iVIC.…”
Section: A Implementationmentioning
confidence: 99%
“…Incident handling is a general strategy that guides an organisation in dealing with crises, and generally describes the types of incident, identifies the relevant person in‐charge, and outlines the action strategy. Both Cloud Service Providers (CSP) and Cloud Service Users (CSU) may find that ‘traditional’ incident handling procedures are not fit‐for‐purpose because of the challenges posed by the nature of cloud infrastructure . Furthermore, the requirements and challenges of the incident handling principles faced by CSUs and CSPs are likely to differ (e.g.…”
Section: Introductionmentioning
confidence: 99%