Intrusion detection techniques for infrastructure as a service cloud

Udaya Tupakula*, Vijay Varadharajan, Naveen Akku

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

44 Citations (Scopus)

Abstract

Today, cloud computing is one of the increasingly popular technology where the customer can use the resources of the cloud services providers to perform their tasks and only pay for the resources they use. The customer virtual machines in the cloud are vulnerable to different types of attacks. In this paper we propose techniques for securing customer virtual machines from different types of attacks in the Infrastructure as a Service cloud and describe how this can be achieved in practice. Our model enables to differentiate attack traffic originating from each virtual machine even if multiple virtual machines on a VMM are sharing a single IP address.

Original languageEnglish
Title of host publicationProceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011
EditorsJinjun Chen, Wanchun Dou, Jianxun Liu, Laurence T. Yang, Jianhua Ma
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages744-751
Number of pages8
ISBN (Print)9780769546124
DOIs
Publication statusPublished - 2011
Event9th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., DASC 2011, incl. 9th Int. Conf. on Pervasive Intelligence and Computing, PICom 2011, 9th Int. Symp. on Embedded Computing, EmbeddedCom 2011, 1st Int. Conf. on Cloud and Green Comput.CGC - Sydney, NSW, Australia
Duration: 12 Dec 201114 Dec 2011

Other

Other9th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., DASC 2011, incl. 9th Int. Conf. on Pervasive Intelligence and Computing, PICom 2011, 9th Int. Symp. on Embedded Computing, EmbeddedCom 2011, 1st Int. Conf. on Cloud and Green Comput.CGC
Country/TerritoryAustralia
CitySydney, NSW
Period12/12/1114/12/11

Fingerprint

Dive into the research topics of 'Intrusion detection techniques for infrastructure as a service cloud'. Together they form a unique fingerprint.

Cite this