Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control

Zbigniew Kalbarczyk, Rakesh Bobba, Domenico Cotroneo, Fei Deng, Zachary Estrada, Jingwei Huang, Jun Ho Huh, Ravishankar K. Iyer, David M. Nicol, Cuong Pham, Antonio Pecchia, Aashish Sharma, Gary Wang, Lok Yan

Research output: Chapter in Book/Report/Conference proceedingChapter


In this chapter, we discuss methods to address some of the challenges in achieving resilient cloud computing. The issues and potential solutions are brought about by examples of (i) active and passive monitoring as a way to provide situational awareness about a system and users' state and behavior; (ii) automated reasoning about system/application state based on observations from monitoring tools; (iii) coordination of monitoring and system activities to provide a robust response to accidental failures and malicious attacks; and (iv) use of smart access control methods to reduce the attack surface and limit the likelihood of an unauthorized access to the system. Case studies covering different application domains, for example, cloud computing, large computing infrastructure for scientific applications, and industrial control systems, are used to show both the practicality of the proposed approaches and their capabilities, for example, in terms of detection coverage and performance cost.
Original languageEnglish (US)
Title of host publicationAssured Cloud Computing
EditorsRoy H. Campbell, Charles A. Kamhoua, Kevin A. Kwiat
PublisherWiley-IEEE Press
ISBN (Electronic)9781119428497
ISBN (Print)9781119428633
StatePublished - Dec 20 2018


  • attribute-based access control
  • system reliability
  • shared computing infrastructure
  • role-based access control
  • resilient cloud computing
  • passive system monitoring
  • hypervisor probes
  • dynamic system monitoring


Dive into the research topics of 'Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control'. Together they form a unique fingerprint.

Cite this