Browse > Article

A Study on Improvement Stability of Cloud Service using Attack Information Collection  

Yang, Hwan Seok (중부대학교 정보보호학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.9, no.2, 2013 , pp. 73-79 More about this Journal
Abstract
Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.
Keywords
HoneyVM; Virtualization; Cloud Service;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Dahbur, B. Mohammad, and A. B. Tarakji, "A survey of risks, threats and vulnerabilities in cloud computing," in Preceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications, 2011, pp. 1-6.
2 W. Cin, H. Ting-iei, and L. I. U. Xiao-yu, "Research on the Intrusion Detection Mechanism based on Cloud Computing," Computing, 2010, pp. 125-128.
3 정성민, 김태경, "효율적인 클라우드 컴퓨팅을 위한 가상장비 할당 방법," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 73-79.
4 주승환, 서희석, 김상연, "한국형 네트워크 보안시스템 성능 평가 방법론 설계," 디지털산업정보학회지, 제7권, 제3호, 2011, pp. 97-105.
5 S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 43, no. 1, 2011, pp. 1-11.
6 U. Tupakula, V. Varadharajan, and N. Akku, "Intrusion Detection Techniques for Infrastructure as a Service Cloud," 2011 IEEE 9th International Conference on Depedable, Autonomic and Secure Computing, 2011, pp. 744-751.
7 엄정호, 박선호, 정태명, "네트워크 취약성 분석을 위한 확장된 사이버 공격 트리에 관한 연구," 디지털산업정보학회지, 제6권, 제3호, 2010, pp. 49-57.
8 F. Sabahi, "Secure Virtualization for Cloud Environment using Hypervisor-based Technology," Int. Journal of Machine Learning and Computing, Vol. 2, No. 1, 2012.
9 S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, and D. Xu, "DKSM: Subverting Virtual Machine Introspection for Fun and Profilt," Reliable Distributed Systems, 2010 29th IEEE Symposium on. 2010, pp. 82-91.
10 T. Mather, S. Kumaraswamy, and S. Latif, "Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance," O'reilly media, 2009.