2011 5th International Conference on Network and System Security 2011
DOI: 10.1109/icnss.2011.6059967
|View full text |Cite
|
Sign up to set email alerts
|

CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0
1

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 69 publications
(47 citation statements)
references
References 7 publications
0
44
0
1
Order By: Relevance
“…In particular, the studies in [15], [16] aimed to adjust the performance of traditional Intrusion Detection Systems (IDS) under signature-based techniques that employ Deep Packet Inspection (DPI) on network packets. Moreover, work in [17], [18] studied system-related features on monitored VMs by employing Virtual Machine Introspection (VMI) methods in order to detect threats on a given VM's Operating System (OS).…”
Section: Malware and Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, the studies in [15], [16] aimed to adjust the performance of traditional Intrusion Detection Systems (IDS) under signature-based techniques that employ Deep Packet Inspection (DPI) on network packets. Moreover, work in [17], [18] studied system-related features on monitored VMs by employing Virtual Machine Introspection (VMI) methods in order to detect threats on a given VM's Operating System (OS).…”
Section: Malware and Detection Methodsmentioning
confidence: 99%
“…Considering feature extraction takes in the order of seconds to complete 17 , the time taken to train the classifier is negligible, especially since it is only required to take place once during the lifetime of the classifier. In scenarios where the role of a server changes significantly and frequently the classifier would need to be retrained in order to produce a model of normal behaviour that sufficiently characterises the new normal behaviour patterns.…”
Section: Training and Classification Cost Analysismentioning
confidence: 99%
“…This proofbased system is critical to enabling security guarantees in SLAs, wherein clients pay for a desired level of security and are assured they will receive a certain compensation in the event of cloud misbehavior. CloudSec [11] it provides active, transparent and real-time security monitoring for multiple concurrent VMs hosted on a cloud platform in an IaaS setting.…”
Section: B Challenges To Security Monitoring In Cloudsmentioning
confidence: 99%
“…Regarding virtual machine security, work has been done building on introspection capabilities to identify security incidents [18]. Approaches like CloudSec [19] follow this path by offering in depth memory inspection of the monitored virtual machine. Other systems, like Revirt [20], operate below the operating system for doing both the logging and log-based intrusion detection on hypervisor-built logs.…”
Section: Related Workmentioning
confidence: 99%