Skip to main content

Network Security Evaluation Model Based on Cloud Computing

  • Conference paper
Information Computing and Applications (ICICA 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 308))

Included in the following conference series:

  • 1959 Accesses

Abstract

Cloud computing is an important innovation in the current computing model. The critical problem of cloud computing faced at present is the security issue. In the current network environment, that relying on a single terminal to check the Trojan virus is considered increasingly unreliable. Based on the correspondence between the artificial immune system antibody and pathogen invasion intensity, this paper is to establish a real-time network risk evaluation model in cloud computing. This paper builds a hierarchical, quantitative measurement indicator system, and a unified evaluation information base and knowledge base. The paper also combines assets evaluation system and network integration evaluation system, considering from the application layer, the host layer, network layer may be factors that affect the network risks. The experimental results show that the new model improves the ability of intrusion detection and prevention than that of the traditional intrusion prevention systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://en.wikipedia.org/wiki/Cloud_Computing

  2. http://www.mysql.com/news-and-events/sun-to-acquire-mysql.html

  3. Phurivit, S., Naruemon, W., Chalermpol, C.: Practical real-time intrusion detection using machine learning approaches. Computer Communications 34(18), 2227–2235 (2011)

    Article  Google Scholar 

  4. Elshoush, H.T.: Alert correlation in collaborative intelligent intrusion detection systems-A survey. Applied Soft Computing 11(7), 4349–4365 (2011)

    Article  Google Scholar 

  5. Amiri, F., Mahdi, M., Yousefi, R.: Mutual information-based feature selection for intrusion detection systems. Journal of Network and Computer Applications 34(4), 1184–1199 (2011)

    Article  Google Scholar 

  6. Toubiana, V., Labiod, H., Reynaud, L.: A global security architecture for operated hybrid WLAN mesh networks. Computer Networks 54(2), 218–230 (2010)

    Article  MATH  Google Scholar 

  7. Kuby, J.: Immunology. Fifith Edition by Richard A. Goldsby et al

    Google Scholar 

  8. Burnet, F.M.: The Clone Selection Theory of Acquired Immunity. Cambridge University Press, Cambridge (1959)

    Google Scholar 

  9. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8, 443–473 (2000)

    Article  Google Scholar 

  10. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland (1994)

    Google Scholar 

  11. Atay, S., Masera, M.: Challenges for the security analysis of Next Generation Networks. Information Security Technical Report 16(1), 3–11 (2011)

    Article  Google Scholar 

  12. Li, T.: An immunity based network security risk estimation. Science in China Ser. F Information Sciences 48, 557–578 (2005)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, J., Wang, C., Yu, L., Liu, C., Peng, L. (2012). Network Security Evaluation Model Based on Cloud Computing. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34041-3_68

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34040-6

  • Online ISBN: 978-3-642-34041-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics