云环境下的网络流量分析

M. Hasin, B. Madoš, J. Palša, Alla Janitor
{"title":"云环境下的网络流量分析","authors":"M. Hasin, B. Madoš, J. Palša, Alla Janitor","doi":"10.1109/ICETA51985.2020.9379153","DOIUrl":null,"url":null,"abstract":"The article focuses on the research and design of the infrastructure used for data collection from the network traffic of the CLOUD platform. The aim was to identify the structure of network traffic that occurs in the CLOUD platform. From the mentioned data it is possible to evaluate network security of the protocols used in communication and subsequently compare the obtained data with the security standards introduced in the experimental platform. When implementing the measurement, the NetFlow protocol was used, enabling data collection directly on virtual machines located in the CLOUD platform. The measured data was then stored in the non-relational database Elasticsearch. The selected database is intended for the analysis of a large amount of data. The most important part is the creation of an interactive web environment in order to interpret the measured data in a user-friendly form. The next step in the processing of measured data involves the application of artificial intelligence methods to evaluate and predict the existence of potential security problems.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Network Traffic in CLOUD Environment\",\"authors\":\"M. Hasin, B. Madoš, J. Palša, Alla Janitor\",\"doi\":\"10.1109/ICETA51985.2020.9379153\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article focuses on the research and design of the infrastructure used for data collection from the network traffic of the CLOUD platform. The aim was to identify the structure of network traffic that occurs in the CLOUD platform. From the mentioned data it is possible to evaluate network security of the protocols used in communication and subsequently compare the obtained data with the security standards introduced in the experimental platform. When implementing the measurement, the NetFlow protocol was used, enabling data collection directly on virtual machines located in the CLOUD platform. The measured data was then stored in the non-relational database Elasticsearch. The selected database is intended for the analysis of a large amount of data. The most important part is the creation of an interactive web environment in order to interpret the measured data in a user-friendly form. The next step in the processing of measured data involves the application of artificial intelligence methods to evaluate and predict the existence of potential security problems.\",\"PeriodicalId\":149716,\"journal\":{\"name\":\"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETA51985.2020.9379153\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA51985.2020.9379153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文重点研究和设计了用于云平台网络流量数据采集的基础设施。目的是确定发生在云平台上的网络流量的结构。根据上述数据,可以评估通信中使用的协议的网络安全性,并随后将获得的数据与实验平台中引入的安全标准进行比较。在实施测量时,使用了NetFlow协议,可以直接在位于CLOUD平台的虚拟机上收集数据。测量的数据随后存储在非关系数据库Elasticsearch中。所选择的数据库用于分析大量数据。最重要的部分是创建一个交互式网络环境,以便以用户友好的形式解释测量数据。测量数据处理的下一步涉及应用人工智能方法来评估和预测潜在安全问题的存在。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of Network Traffic in CLOUD Environment
The article focuses on the research and design of the infrastructure used for data collection from the network traffic of the CLOUD platform. The aim was to identify the structure of network traffic that occurs in the CLOUD platform. From the mentioned data it is possible to evaluate network security of the protocols used in communication and subsequently compare the obtained data with the security standards introduced in the experimental platform. When implementing the measurement, the NetFlow protocol was used, enabling data collection directly on virtual machines located in the CLOUD platform. The measured data was then stored in the non-relational database Elasticsearch. The selected database is intended for the analysis of a large amount of data. The most important part is the creation of an interactive web environment in order to interpret the measured data in a user-friendly form. The next step in the processing of measured data involves the application of artificial intelligence methods to evaluate and predict the existence of potential security problems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信