Anomaly behavior detection model in cloud computing

来源 :第九届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:ahutxhb
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
This paper proposes the anomaly behavior detection model based on cloud computing.Virtual machine (VM) is one of the key components of cloud infrastructure as a service (IaaS), secure VM is bound to affect IaaS security.
其他文献
Nowadays, owing to the dual pressures of the resource depletion and environmental pollution, the steel industry in China is facing great challenges.
会议
Heating and treating with microwave energy is a green and highly efficient technique for various thermal processes.Advantages of microwave heating compared over conventional processing methods include
会议
In-situ high temperature Raman spectroscopic techniques were developed on several instrumentations by using continuous and pulsed lasers, and phonon detectors (PMT, CCD and ICCD), combined with macro
会议
In order to reveal the leaching regulation of RE and impurities, and enhance the leaching process of RE, the effects of concentration of ammonium sulfate, pH and leaching temperature on the leaching b
会议
Access control is a key mechanism to secure outsourced data in mobile clouds.Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations perfo
会议
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique.
会议
云计算使得IT资源按需提供服务成为可能,简单方便,节省成本,广受用户欢迎.然而,由于云计算工作模式的变化,引发了用户心理上的顾虑[1-3].显然,能否向用户提供安全可信的云服务,是当前云计算成功应用亟需解决的关键问题[4-6].
会议
The design and security analysis of symmetric cipher algorithm is closely related.In order to resist cryptosystem attack effectively, cipher algorithm mainly uses multiplication and iteration of eleme
会议
ZhengYu Wu等[1],于2012年提出,X86虚拟化平台上以内存总线为媒介的侧信道.这种侧信道的传输速率首次达到了TCSEC(Trusted Computer System Evaluation Criteria)给定的阈值.另外,其可靠,易控制的特点使得这种侧信道攻击更加危险.
会议
篡改是软件保护过程中的一大难题.近年来,进程级虚拟机(Process-Level Virtual Machine,PVM)保护方案的研究成为软件防篡改方案的一个热点.多数已有的PVM工具都将待保护程序关键代码段的信息进行变换后转储至新的代码空间.然而,攻击者可以利用攻击工具或技术定位分析新代码段的位置以及包含的内容,通过静态和动态分析得到新代码段的组织结构或执行原理.本文分析整理PVM保护机制,并
会议