Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods

Amira Bradai, H. Afifi
{"title":"Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods","authors":"Amira Bradai, H. Afifi","doi":"10.1109/CyberC.2012.38","DOIUrl":null,"url":null,"abstract":"A trust-based intrusion detection scheme for hybrid cloud computing is proposed. We consider a trust metric based on honesty, cooperation and efficiency for detecting malicious machines. We use Perron-Frobenius theorem to detect intrusion based on trust and observations. By statistically analyzing pair trust distributed results, the portal of the application applies trust-based intrusion detection to assess the trustworthiness and maliciousness. An analytical model and simulation for performance are developed. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious. Results confirm that our proposal is flexible enough to detect malicious behaviours considering various parameters. This work can guide future execution in the cloud resource.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberC.2012.38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

A trust-based intrusion detection scheme for hybrid cloud computing is proposed. We consider a trust metric based on honesty, cooperation and efficiency for detecting malicious machines. We use Perron-Frobenius theorem to detect intrusion based on trust and observations. By statistically analyzing pair trust distributed results, the portal of the application applies trust-based intrusion detection to assess the trustworthiness and maliciousness. An analytical model and simulation for performance are developed. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious. Results confirm that our proposal is flexible enough to detect malicious behaviours considering various parameters. This work can guide future execution in the cloud resource.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于代数方法的云计算中基于信任的入侵检测
提出了一种基于信任的混合云入侵检测方案。我们考虑了一个基于诚实、合作和效率的信任度量来检测恶意机器。我们使用Perron-Frobenius定理来检测基于信任和观察的入侵。通过统计分析对信任分布结果,应用门户采用基于信任的入侵检测来评估系统的可信度和恶意程度。建立了性能分析模型并进行了仿真。我们根据最小信任阈值分析假警报的敏感性,低于该阈值的节点被认为是恶意的。结果证实,我们的建议是足够灵活的检测恶意行为考虑各种参数。这项工作可以指导未来在云资源中的执行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Deadline Based Performance Evaluation of Job Scheduling Algorithms The Digital Aggregated Self: A Literature Review An Efficient TCB for a Generic Content Distribution System Testing Health-Care Integrated Systems with Anonymized Test-Data Extracted from Production Systems A Framework for P2P Botnet Detection Using SVM
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1