2017
DOI: 10.1155/2017/2301970
|View full text |Cite
|
Sign up to set email alerts
|

Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment

Abstract: Cloud computing platforms are usually based on virtual machines as the underlying architecture; the security of virtual machine systems is the core of cloud computing security. This paper presents an immune-based intrusion detection model in virtual machines of cloud computing environment, denoted as IB-IDS, to ensure the safety of user-level applications in client virtual machines. In the model, system call sequences and their parameters of processes are used, and environment information in the client virtual… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…An emerging technology for supporting network flexibility and availability is SDN. The SDN technology in 5G network promises to provide new capabilities and solutions to enable the network control to be programmable, adaptable, manageable, and cost‐effective, which makes it suitable for the composition of heterogeneous networks and services 19–23 . In fact, the physical network infrastructure based on SDN is abstracted from applications and services, and the networking intelligence based on SDN is logically managed in a centralized manner.…”
Section: Background and Related Workmentioning
confidence: 99%
“…An emerging technology for supporting network flexibility and availability is SDN. The SDN technology in 5G network promises to provide new capabilities and solutions to enable the network control to be programmable, adaptable, manageable, and cost‐effective, which makes it suitable for the composition of heterogeneous networks and services 19–23 . In fact, the physical network infrastructure based on SDN is abstracted from applications and services, and the networking intelligence based on SDN is logically managed in a centralized manner.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Yang started from the main idea of changes leading to danger,and established an adaptive danger signal extraction model based on finding changes [9]. Zhang presented an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted IVMIDS, to ensure the safety of user-level applications in client virtual machines [10]. Rimiru described an integrated innate and adaptive immune system architecture which is shown to incorporate many properties of natural immune systems [11].Seresht proposed an agent-based approach using artificial immune system paradigms as a successful mechanism for a distributed intrusion detection system [12].…”
Section: Introductionmentioning
confidence: 99%