基于改进聚类的云计算平台攻击检测方法An Intrusion Detection Method Based on Improved Cluster of Cloud Computing
赵鑫龙,张维石,李辉
摘要(Abstract):
云计算应用日趋广泛,其安全性问题也在日益凸显。由于网络安全攻击行为的升级,传统的攻击检测技术已不适用于云计算安全防护。本文基于云计算平台特点和安全需求以及K-means攻击检测方法,提出了一种基于进化算法的聚类技术,并设计了一种面向云计算平台的分布式攻击检测改进型方法。使用该方法,可以更好的获得聚类初始中心值,提高攻击检测率,并且加快攻击检测速度。最后,进行了实验仿真并分析了测试结果,验证其具有较好的实用价值。
关键词(KeyWords): 云计算;攻击检测;改进K-means;虚拟机;仿真分析
基金项目(Foundation): 国家自然科学基金资助项目(编号:61272172)
作者(Author): 赵鑫龙,张维石,李辉
参考文献(References):
- [1]Syed Rizvi,Nathan Showan,John Mitchell.Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking[J].Procedia Computer Science,2015,61:206-212
- [2]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83
- [3]Claudio Mazzariello,Roberto Bifulco,Roberto Canonico.Integrating a Network IDS into an Open Source Cloud Computing Environment[M].Atlanta,USA:International Conference on Information Assurance and Security(IAS),2010:265-270
- [4]Kleber Vieira,Alexandre Schulter,Carlos Becker Westphall et al.Intrusion Detection for Grid and Cloud Computing[J].IT Professional,2010,12(4):38-43
- [5]P Kumar,N Nitin,V Sehgal et al.A novel approach for security in Cloud Computing using Hidden Markov Model and clustering[J].World Congress on Information&Communication Technologies,2011:810-815
- [6]CN Modi,DR Patel,A Patel et al.Bayesian Classifier and Snort based network intrusion detection system in cloud computing[C]//International Conference on Computing Communication and Networking Technologies,2012:1-7
- [7]Anand Kannan.Performance evaluation of security mechanisms in Cloud Networks[D].Sweden:HEC Stockholm,2012.
- [8]Massimo Ficco,Luca Tasquier,Rocco Aversa.Intrusion Detection in Cloud Computing[C]//COMPIEGNE,FRANCE:International Conference on P2P,Parallel,Grid,Cloud and Internet Computing,2013:276-283
- [9]Wei Xiong,Hanping Hu,Naixue Xiong et al.Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications[J].Information Sciences,2014,258(5):403-415
- [10]Snehal G.Kene,Deepti P.Theng.A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges[C]//Egypt:IEEE SPONSORED 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYS-TEMS(ICECS‘2015),2015.
- [11]黎明,宋广军.云计算环境下软件异常区域检测模型仿真[J].计算机仿真,2015,32(9):314-317
- [12]王一川,马建峰,卢笛,张留美,孟宪佳.面向云环境内部DDoS攻击检测的博弈论优化[J].计算机研究与发展,2015,(8):1873-1882
- [13]何文河,李陶深,黄汝维.云环境下基于改进BP算法的入侵检测模型[J].计算机技术与发展,2016,(2):87-90
- [14]徐洋,孙建忠,张焕国,谢晓尧.云环境下Web服务应用层DDoS攻击检测系统[J].计算机应用研究,2016,33(09).
- [15]张涛,周文强,李坤等.一种基于K-Mean算法的移动应用兼容性测试方法[J].西北工业大学学报,2015,(3):512-515
- [16]傅涛,孙亚民.基于PSO的k-means算法及其在网络入侵检测中的应用[J].计算机科学,2011,38(05):54-55
- [17]邢永峰.云计算环境下混合多样攻击群检测技术仿真[J].计算机仿真,2014,31(06):295-298