{"title":"日志文件的集中化,以提高云安全性","authors":"M. Amar, M. Lemoudden, B. El Ouahidi","doi":"10.1109/CLOUDTECH.2016.7847696","DOIUrl":null,"url":null,"abstract":"The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of the system at stake. Log file generation has Big Data characteristics that should be considered for upgrade from a manual method to an automatic one based on Big Data solutions. Therefore, this paper proposes a log file centralization and a diagnostic approach based on the misuse and the anomaly detection techniques, which will improve the detection of attacks. The FP-growth algorithm presented will ensure the prevention of consecutive violations.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Log file's centralization to improve cloud security\",\"authors\":\"M. Amar, M. Lemoudden, B. El Ouahidi\",\"doi\":\"10.1109/CLOUDTECH.2016.7847696\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of the system at stake. Log file generation has Big Data characteristics that should be considered for upgrade from a manual method to an automatic one based on Big Data solutions. Therefore, this paper proposes a log file centralization and a diagnostic approach based on the misuse and the anomaly detection techniques, which will improve the detection of attacks. The FP-growth algorithm presented will ensure the prevention of consecutive violations.\",\"PeriodicalId\":133495,\"journal\":{\"name\":\"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CLOUDTECH.2016.7847696\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUDTECH.2016.7847696","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Log file's centralization to improve cloud security
The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of the system at stake. Log file generation has Big Data characteristics that should be considered for upgrade from a manual method to an automatic one based on Big Data solutions. Therefore, this paper proposes a log file centralization and a diagnostic approach based on the misuse and the anomaly detection techniques, which will improve the detection of attacks. The FP-growth algorithm presented will ensure the prevention of consecutive violations.