{"title":"基于云系统的网络入侵检测与监控","authors":"M. Nanda, M. Patra","doi":"10.1109/ICAML48257.2019.00045","DOIUrl":null,"url":null,"abstract":"In recent times there has been a shift towards Cloud based systems for varieties of applications. But, security concerns have always been a challenge for its widespread acceptance. Some of the major challenges relate to data security, deployment of applications, and security of infrastructural elements. In this paper, we have dealt with one of the important security issues, namely, network intrusion detection, in order to protect cloud infrastructure from malicious users. Our work involves continuous tracking of communication among virtual machines and analyse the packets transmitted over the network for possible intrusive attempts. We have developed appropriate mechanism to monitor the network and measure the sensitivity of certain network ports used for data transmission.","PeriodicalId":369667,"journal":{"name":"2019 International Conference on Applied Machine Learning (ICAML)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Network Intrusion Detection and Monitoring in Cloud Based Systems\",\"authors\":\"M. Nanda, M. Patra\",\"doi\":\"10.1109/ICAML48257.2019.00045\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent times there has been a shift towards Cloud based systems for varieties of applications. But, security concerns have always been a challenge for its widespread acceptance. Some of the major challenges relate to data security, deployment of applications, and security of infrastructural elements. In this paper, we have dealt with one of the important security issues, namely, network intrusion detection, in order to protect cloud infrastructure from malicious users. Our work involves continuous tracking of communication among virtual machines and analyse the packets transmitted over the network for possible intrusive attempts. We have developed appropriate mechanism to monitor the network and measure the sensitivity of certain network ports used for data transmission.\",\"PeriodicalId\":369667,\"journal\":{\"name\":\"2019 International Conference on Applied Machine Learning (ICAML)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Applied Machine Learning (ICAML)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAML48257.2019.00045\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Applied Machine Learning (ICAML)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAML48257.2019.00045","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Intrusion Detection and Monitoring in Cloud Based Systems
In recent times there has been a shift towards Cloud based systems for varieties of applications. But, security concerns have always been a challenge for its widespread acceptance. Some of the major challenges relate to data security, deployment of applications, and security of infrastructural elements. In this paper, we have dealt with one of the important security issues, namely, network intrusion detection, in order to protect cloud infrastructure from malicious users. Our work involves continuous tracking of communication among virtual machines and analyse the packets transmitted over the network for possible intrusive attempts. We have developed appropriate mechanism to monitor the network and measure the sensitivity of certain network ports used for data transmission.