期刊文献+

多源异构数据的云平台安全态势评估系统 被引量:1

The Assessment System of Cloud Platform Security Situation Based on Multi-source Heterogeneous Data
在线阅读 下载PDF
导出
摘要 针对云平台的安全性问题,为提高系统管理员对云平台整体的安全态势感知能力,增强对云平台的可控性,本文首次设计了一种面向多源异构数据的云平台安全态势量化评估系统。对已有的安全态势评估方法进行了分析比较,针对云平台安全中多数据源的特点,提出基于云计算安全性指标体系的多源异构数据融合方法。利用大数据处理工具,对云平台的多源异构数据进行各保护层面态势指标融合和保护层面态势融合,得到整体的安全态势。本文运用该系统对所搭建的openstack云平台进行评估,实验结果表明该系统能够准确实时地反映云平台的安全态势。 Aiming at the security issues existing in cloud platform,this paper designed a quantitative assessment system for cloud platform security situation for the first time,to improve administrator's security situational awareness of the whole cloud platform,and make the cloud platform more controllable. The existing security situational assessment methods are analyzed and compared in detail,in view of the multi-source information in cloud platform security,a new method to fuse multi-source heterogeneous data based on the cloud computing security indicator system is proposed. Using big data processing tools,the security situation values of each protection levels are got through situational indicators fusion and the security situation value of cloud platform is calculated by protection levels situation fusion. In the end,the cloud platform security situation assessment result is obtained. In this paper,the system is used to assess the openstack cloud platform,the results show that the system can accurately reflect the security situation of cloud platform in real time.
出处 《网络新媒体技术》 2017年第3期8-13,共6页 Network New Media Technology
基金 中国科学院先导专项"面向感知中国的新一代信息技术研究"(No.XDA06040601) 新疆维吾尔自治区科技计划项目(No.201230121) 国家电网科技合作项目(No.SGAHDK00YJJS1600031)
关键词 云平台安全 态势评估 多源异构数据 指标体系 数据融合 Cloud platform security Situation assessment Multi-source heterogeneous data Indicator system Data fusion
  • 相关文献

参考文献3

二级参考文献21

  • 1NORT H S.网络入侵检测分析员手册[M].北京:人民邮电出版社,2000.
  • 2WONG W K, CHEUNG D W, KAO B. Secure kNN computation on encrypted databases[J]. ACM SIGMOD International Conference on Management of Data. 2009 :139-152.
  • 3Apache. Hadoop[EB/OL].[2012-05-12].http://hadoop. apache. org/.
  • 4SUBASHINI S, KAVITHA V. A survey on security issues in service delivery models of cloud computing[C]. India: Anna University Tirunelveli.2007.
  • 5Arnes A,Valeur F,Vigna G.Using hidden markov models to evaluate the risk of intrusions[J].Proceedings of the Recent Advances in Intrusion Detection.Hamburg,Germany,2006.
  • 6Haslum K,Moe M E G,Knapskog S J.Real-time intrusion prevention and security analysis of networks using HMMs[J].Proceedings of the 33rd IEEE Conference on Local Computer Networks.Montreal,Canada,2008.
  • 7Rabiner L.R,A tutorial on hidden Markov model and selected applications in speech recognition[J].Proceedings of the IEEE,1989.
  • 8Xiaoyong C,Yangdan N.The research on dynamic risk assessment based on Hidden Markov Models[J].Intern-ational Conference on Computer Science and Service System.2012.
  • 9Shameli S.A,Dagenais M,Jabbarifar M,couture M.Real time intrusion prediction based on optimized alerts with hidden Markov Model[J].Journal of networks 2012.
  • 10Arens A,Sallhammar K,Haslum K.Real-time risk assessment with network sensors and intrusion detection systems[J].Computational Intelligence and Security,2005.

共引文献6

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部