广东工业大学学报
廣東工業大學學報
엄동공업대학학보
JOURNAL OF GUANGDONG UNIVERSITY OF TECHNOLOGY
2014年
3期
55-61
,共7页
入侵防御%云计算%信任理论
入侵防禦%雲計算%信任理論
입침방어%운계산%신임이론
intrusion prevention%cloud computing%trust theory
云计算从提出以来就具备着动态性、虚拟化和开放性,频频出现的各种大型的云安全事故使得云环境中的安全性受到质疑。为了能够确保云环境的安全,将入侵防御技术与可信计算的信任理论相结合,提出了一个云环境下基于可信计算的入侵防御框架模型。该模型从入侵防御的原理出发,首先实时监控采集、获取行为特征,然后将这些特征进行规范化,并逐步确定各个特征的权重后得出用户节点的可信度。利用多种云端的集群服务器引擎进行检测防御以及综合分析决策和聚类分析,使云端能够及时快速、高效地抵御恶意行为的攻击,改变传统入侵防御各自为营,检测防御滞后的状况,为云用户提供最大安全限度的入侵防御服务,同时也能够确保云端抵御攻击,做到云端和云用户双向安全的效果。
雲計算從提齣以來就具備著動態性、虛擬化和開放性,頻頻齣現的各種大型的雲安全事故使得雲環境中的安全性受到質疑。為瞭能夠確保雲環境的安全,將入侵防禦技術與可信計算的信任理論相結閤,提齣瞭一箇雲環境下基于可信計算的入侵防禦框架模型。該模型從入侵防禦的原理齣髮,首先實時鑑控採集、穫取行為特徵,然後將這些特徵進行規範化,併逐步確定各箇特徵的權重後得齣用戶節點的可信度。利用多種雲耑的集群服務器引擎進行檢測防禦以及綜閤分析決策和聚類分析,使雲耑能夠及時快速、高效地牴禦噁意行為的攻擊,改變傳統入侵防禦各自為營,檢測防禦滯後的狀況,為雲用戶提供最大安全限度的入侵防禦服務,同時也能夠確保雲耑牴禦攻擊,做到雲耑和雲用戶雙嚮安全的效果。
운계산종제출이래취구비착동태성、허의화화개방성,빈빈출현적각충대형적운안전사고사득운배경중적안전성수도질의。위료능구학보운배경적안전,장입침방어기술여가신계산적신임이론상결합,제출료일개운배경하기우가신계산적입침방어광가모형。해모형종입침방어적원리출발,수선실시감공채집、획취행위특정,연후장저사특정진행규범화,병축보학정각개특정적권중후득출용호절점적가신도。이용다충운단적집군복무기인경진행검측방어이급종합분석결책화취류분석,사운단능구급시쾌속、고효지저어악의행위적공격,개변전통입침방어각자위영,검측방어체후적상황,위운용호제공최대안전한도적입침방어복무,동시야능구학보운단저어공격,주도운단화운용호쌍향안전적효과。
Cloud computing has the nature of being dynamic , virtual and open since it was used , and all kinds of large-scale cloud security incidents make the safety of cloud environments frequently questioned . To ensure the security of cloud environments , it proposed an intrusion prevention framework model , based on trusted computing in cloud environments , by combining intrusion prevention technologies and trusted computing ideas .The model began with the principle of intrusion prevention with access to behav-ioral characteristics .Then , these features were gradually normalized , and the weight of each feature was determined to obtain user nodes'credibility.Next, it used a variety of cloud cluster server engines to de-tect defense and make integrated decision analysis and cluster analysis , enabling the cloud to make timely fast intrusion prevention , which avoids the drawbacks of the traditional intrusion prevention , such as min-ding only their own business , lagging behind in detecting and preventing attacks .The model provides cloud users with the maximum intrusion prevention services , and ensures that the cloud can withstand at-tacks, making the cloud and cloud users secure .