Downloads: 141 | Views: 151
Research Paper | Computer Science & Engineering | India | Volume 8 Issue 2, February 2019
Secure: Self-Protection Approach in Cloud Resource Management
Sangeetha G M | Lavanya S [3] | Prashanth [37]
Abstract: Cloud computing is a modern technology that increase application potentialities in terms of functioning, elastic resource management and collaborative execution approach. Cloud resource management requires complex policies and decisions for multi-objective optimization. It is challenging - the complexity of the system makes it impossible to have accurate global state information. Affected by unpredictable interactions with the environment, e. g. , system failures, attacks. Cloud service providers are faced with large fluctuating loads which challenge the claim of cloud elasticity. This paper focuses on a self-protecting mechanism i. e. , the property of autonomic computing was proposed to make the cloud self-protected without human intervention from intrusions and attacks. The architecture of self-protecting of cloud was presented and describes the basic interaction and functionality of each component of architecture. Self-protection is the ability of a computing system to defend itself against threats and intrusions. A self-protection component aids in distinguishing and recognizing intimidating behaviour and reacts autonomously to protect itself against malicious attacks. This paper proposes a Self-protection approach in cloud Resource management (SECURE) approach for dealing with security attacks. SECURE can create new signatures automatically and provide security against DDoS, Probing, U2R, R2L and DoS security attacks. SECURE continuously monitors security attacks during the execution of workloads, performs analysis to understand alerts in the case of security attacks, makes a plan to perform required actions to manage threats, and executes the action. Security agents (sensors) are created on SVM as an anomaly detector. SECURE increases the security of cloud-based services and increases intrusion detection rate if the same threat arrives again
Keywords: security attacks, cloud, resource management, zero-day attack, self-protection approach
Edition: Volume 8 Issue 2, February 2019,
Pages: 1313 - 1318
Similar Articles with Keyword 'security attacks'
Downloads: 2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh [2] | Vaibhav Pandey
Downloads: 102
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2203 - 2208Review on MANETs Characteristics, Challenges, Application and Security Attacks
Anuj Rana | Sandeep Gupta [2]