Detecting the run time attacks in the cloud with an evidence collection based approach

Jie Lin,Chuanyi Liu,Zhichun Ning,Binxing Fang
DOI: https://doi.org/10.1109/CCIS.2014.7175790
2014-01-01
Abstract:As the impacts of security threats are amplified and spread quickly in the cloud, especially with the attribute of large-scale virtualization. Most of researches focus on monitoring the network traffic. However, these methods don't check how the attack happened and what damage the attack caused for the virtual infrastructure. This paper presents a logging method to analyze the potential attacks out of VM and a prototype was implemented. The experimental results show that this method can detect the real world attacks effectively and the performance overhead is acceptable.
What problem does this paper attempt to address?