2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing 2015
DOI: 10.1109/ccgrid.2015.133
|View full text |Cite
|
Sign up to set email alerts
|

Towards Self Adaptable Security Monitoring in IaaS Clouds

Abstract: Abstract-Traditional intrusion detection systems are not adaptive enough to cope with the dynamic characteristics of cloud-hosted virtual infrastructures. This makes them unable to address new cloud-oriented security issues. In this paper we introduce SAIDS, a self-adaptable intrusion detection system tailored for cloud environments. SAIDS is designed to reconfigure its components based on environmental changes. A prototype of SAIDS is described.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…AL-SAFE is a secure, introspection-based, twolevel, application level firewall. It is part of our self-adaptable security monitoring framework for IaaS clouds [12]. AL-SAFE rulesets are automatically reconfigured upon the occurrence of changes in two different levels: the cloud infrastructure (e.g.…”
Section: Two-level Firewall Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…AL-SAFE is a secure, introspection-based, twolevel, application level firewall. It is part of our self-adaptable security monitoring framework for IaaS clouds [12]. AL-SAFE rulesets are automatically reconfigured upon the occurrence of changes in two different levels: the cloud infrastructure (e.g.…”
Section: Two-level Firewall Architecturementioning
confidence: 99%
“…If this is true it extracts the process name, the pid as well as source and destination port, IP and protocol. The time elapsed between two consecutive snapshots/introspections is defined by the tenant and can be dynamically adapted by the Adaptation Manager [12].…”
Section: Two-level Firewall Architecturementioning
confidence: 99%
See 1 more Smart Citation