CQUniversity
Browse

Monitoring insiders activities in cloud computing using rule based learning

conference contribution
posted on 2017-12-06, 00:00 authored by Md Tanzim Khorshed, A B M Shawkat Ali, Saleh Wasimi
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider’s constraints or inability in monitoring its employees, and lack of transparency, may make the detection process even harder. We found these insiders’ activities form similar pattern in the monitoring systems as some other cyber attacks because these also uses huge computer resources. In this paper we first provide a brief overview on the importance of monitoring insiders’ activities through a literature survey on cloud computing security. Then, we observe some of the real life insiders’ activities that can be detected from the performance data in a hypervisor and its guest operating systems. Rule based learning is successfully used for identification of these activities in this research. We further observe that some of these insiders’ activities can on occasions turn into a malicious insider’s attack, and thus, need constant monitoring in the cloud environment.

History

Start Page

757

End Page

764

Number of Pages

8

Start Date

2011-01-01

Finish Date

2011-01-01

Location

Changsha, China

Publisher

IEEE Computer Society Conference Publications

Place of Publication

Los Alamitos, Calif.

Peer Reviewed

  • Yes

Open Access

  • No

External Author Affiliations

Faculty of Arts, Business, Informatics and Education; Not affiliated to a Research Institute;

Era Eligible

  • Yes

Name of Conference

IEEE International Conference on Trust, Security and Privacy in Computing and Communications.;IEEE International Conference on Embedded Software and Systems.;International Conference on Frontier of Computer Science and Technology

Usage metrics

    CQUniversity

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC