首页> 外文学位 >Hybrid Intrusion Detection Systems Adoption in Cloud (IaaS) Platform to Mitigate Botnet Threats
【24h】

Hybrid Intrusion Detection Systems Adoption in Cloud (IaaS) Platform to Mitigate Botnet Threats

机译:在云(IaaS)平台中采用混合入侵检测系统来缓解僵尸网络威胁

获取原文
获取原文并翻译 | 示例

摘要

Cloud computing has continued to experience tremendous growth in recent years, with organizations increasingly leveraging the platform to empower businesses (optimize operation, improve customer engagement, and support the business decision-making process). However, in spite of the success stories inherent to the cloud adoption, lack of adequate security measures remains a critical impediment. The multi-tenancy architecture of the cloud platform facilitates resource sharing among multi-user (including the bad actors), which makes the platform more susceptible to attack. This study examined the use of the hybrid intrusion detection systems (HIDS) to mitigate botnet security threats in Infrastructure as a Service (IaaS) cloud platform. The study investigated the impact of HIDS and the degree to which the HIDS correlates with the network-based intrusion detection system (NIDS) and host-based intrusion detection system (HBIDS) to prevent botnet threats in the IaaS platform. The research employed a correlational, non-experimental quantitative research method that utilized a survey-based technique to collect and analyze the data. The study participants comprised of C-level executives and experienced IT personnel from a broad range of IT domain knowledge, drawn from LinkedIn Network and SurveyMonkey panelists. The researcher employed the descriptive and correlational (Spearman's Correlation) statistical analyses to derive inferences from the test hypotheses to provide answers to the research questions. The outcome of the investigation suggested substantial support for the use of the HIDS to prevent botnet malware in the IaaS cloud computing. Further, the study highlighted a strong correlation, with a positive statistical significance, between the HIDS and NIDS, and between the HIDS and HBIDS. Moreover, the result suggested strongly, the use of the HIDS to secure and safeguard cloud-based services, organizations' data, applications, and services against botnet malware threats in the cloud (IaaS) platform.
机译:近年来,随着组织越来越多地利用该平台来增强业务(优化运营,提高客户参与度并支持业务决策过程),云计算一直在经历着巨大的增长。但是,尽管采用云技术固有的成功案例,但是缺乏适当的安全措施仍然是一个严重的障碍。云平台的多租户架构促进了多用户(包括不良行为者)之间的资源共享,这使得平台更容易受到攻击。这项研究检查了混合入侵检测系统(HIDS)的使用,以缓解基础设施即服务(IaaS)云平台中的僵尸网络安全威胁。该研究调查了HIDS的影响以及HIDS与基于网络的入侵检测系统(NIDS)和基于主机的入侵检测系统(HBIDS)相关联的程度,以防止IaaS平台中的僵尸网络威胁。该研究采用了一种相关的,非实验性的定量研究方法,该方法利用基于调查的技术来收集和分析数据。研究参与者由来自LinkedIn网络和SurveyMonkey小组成员的,具有广泛IT领域知识的C级主管和经验丰富的IT人员组成。研究人员使用描述性和相关性(斯皮尔曼相关性)统计分析从测试假设中得出推论,从而为研究问题提供答案。调查结果表明,对使用HIDS来防止IaaS云计算中的僵尸网络恶意软件提供了实质性支持。此外,该研究还强调了HIDS与NIDS之间以及HIDS与HBIDS之间的密切相关,具有正的统计意义。此外,该结果强烈表明,使用HIDS可以保护和保护基于云的服务,组织的数据,应用程序和服务,以抵御云(IaaS)平台中的僵尸网络恶意软件威胁。

著录项

  • 作者

    Olorunmaiye, Jerome.;

  • 作者单位

    Colorado Technical University.;

  • 授予单位 Colorado Technical University.;
  • 学科 Computer science.
  • 学位 D.C.S.
  • 年度 2018
  • 页码 134 p.
  • 总页数 134
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号