Karim Benzidane, Saad Khoudali, F. Leila, A. Sekkaki
{"title":"在云环境中实现安全的虚拟流量","authors":"Karim Benzidane, Saad Khoudali, F. Leila, A. Sekkaki","doi":"10.1109/JNS3.2013.6595467","DOIUrl":null,"url":null,"abstract":"This last few years experienced a new paradigm called Cloud Computing (CC), coming as an extension of Grid Computing and Distributed Computing. This raises many questions about the appropriate infrastructure, processes, and strategy for enacting detection and response to intrusion in a Cloud environment. This article discusses the security and the visibility issues of inter-VM traffic and solutions for it within a Cloud environment context, by proposing an approach relying on distributed intrusion detection technique and packet inspection.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Toward a secure virtual traffic in a cloud environement\",\"authors\":\"Karim Benzidane, Saad Khoudali, F. Leila, A. Sekkaki\",\"doi\":\"10.1109/JNS3.2013.6595467\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This last few years experienced a new paradigm called Cloud Computing (CC), coming as an extension of Grid Computing and Distributed Computing. This raises many questions about the appropriate infrastructure, processes, and strategy for enacting detection and response to intrusion in a Cloud environment. This article discusses the security and the visibility issues of inter-VM traffic and solutions for it within a Cloud environment context, by proposing an approach relying on distributed intrusion detection technique and packet inspection.\",\"PeriodicalId\":157229,\"journal\":{\"name\":\"2013 National Security Days (JNS3)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 National Security Days (JNS3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JNS3.2013.6595467\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 National Security Days (JNS3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS3.2013.6595467","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Toward a secure virtual traffic in a cloud environement
This last few years experienced a new paradigm called Cloud Computing (CC), coming as an extension of Grid Computing and Distributed Computing. This raises many questions about the appropriate infrastructure, processes, and strategy for enacting detection and response to intrusion in a Cloud environment. This article discusses the security and the visibility issues of inter-VM traffic and solutions for it within a Cloud environment context, by proposing an approach relying on distributed intrusion detection technique and packet inspection.