ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure: Self-Protection Approach in Cloud Resource Management

Journal: International Journal of Science and Research (IJSR) (Vol.8, No. 2)

Publication Date:

Authors : ; ; ;

Page : 1313-1318

Keywords : security attacks; cloud; resource management; zero-day attack; self-protection approach;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is a modern technology that increase application potentialities in terms of functioning, elastic resource management and collaborative execution approach. Cloud resource management requires complex policies and decisions for multi-objective optimization. It is challenging - the complexity of the system makes it impossible to have accurate global state information. Affected by unpredictable interactions with the environment, e. g. , system failures, attacks. Cloud service providers are faced with large fluctuating loads which challenge the claim of cloud elasticity. This paper focuses on a self-protecting mechanism i. e. , the property of autonomic computing was proposed to make the cloud self-protected without human intervention from intrusions and attacks. The architecture of self-protecting of cloud was presented and describes the basic interaction and functionality of each component of architecture. Self-protection is the ability of a computing system to defend itself against threats and intrusions. A self-protection component aids in distinguishing and recognizing intimidating behaviour and reacts autonomously to protect itself against malicious attacks. This paper proposes a Self-protection approach in cloud Resource management (SECURE) approach for dealing with security attacks. SECURE can create new signatures automatically and provide security against DDoS, Probing, U2R, R2L and DoS security attacks. SECURE continuously monitors security attacks during the execution of workloads, performs analysis to understand alerts in the case of security attacks, makes a plan to perform required actions to manage threats, and executes the action. Security agents (sensors) are created on SVM as an anomaly detector. SECURE increases the security of cloud-based services and increases intrusion detection rate if the same threat arrives again

Last modified: 2021-06-28 17:24:41