2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High P 2018
DOI: 10.1109/bds/hpsc/ids18.2018.00028
|View full text |Cite
|
Sign up to set email alerts
|

Towards Security Monitoring for Cloud Analytic Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…Further to log-based anomaly detection approaches, there are other research efforts share the same goal for improving the security of big data systems. These approaches span different research directions, ranging from differential privacy [36], integrity verification [37]- [40], policy enforcement [41]- [44], data provenance [45]- [48], honeypot-based [49], to encryptionbased [50] mechanisms, Security Monitoring [51], among others.…”
Section: Graph Neural Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…Further to log-based anomaly detection approaches, there are other research efforts share the same goal for improving the security of big data systems. These approaches span different research directions, ranging from differential privacy [36], integrity verification [37]- [40], policy enforcement [41]- [44], data provenance [45]- [48], honeypot-based [49], to encryptionbased [50] mechanisms, Security Monitoring [51], among others.…”
Section: Graph Neural Networkmentioning
confidence: 99%
“…Our recent approach (SMaaS) [51] proposes an advanced security monitoring service that leverages streaming big data pipeline and Cloud technologies as key enablers to elude the limitations in the aforementioned solutions. However, SMaaS focuses on detecting common patterns of security anomalies for analytic applications.…”
Section: Graph Neural Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…Although they provide outstanding benefits on the perceived trust, they lack of generality and cannot be easily adapted to current scenarios, where different services deployed on hybrid public and private infrastructures are composed at run time. Many of these solutions are in fact ad hoc (Cheah et al, 2018;Elsayed and Zulkernine, 2018), meaning they cannot handle a modern IT system as a whole. Moreover, existing assurance techniques, and corresponding frameworks, require some effort for being integrated with the target system, interfering with its normal operation (e.g., performance), and introducing not-negligible (monetary and business) costs.…”
Section: Introductionmentioning
confidence: 99%