Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control

Zbigniew Kalbarczyk, Rakesh Bobba, Domenico Cotroneo, Fei Deng, Zachary Estrada, Jingwei Huang, Jun Ho Huh, Ravishankar K. Iyer, David M. Nicol, Cuong Pham, Antonio Pecchia, Aashish Sharma, Gary Wang, Lok Yan

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

In this chapter, we discuss methods to address some of the challenges in achieving resilient cloud computing. The issues and potential solutions are brought about by examples of (i) active and passive monitoring as a way to provide situational awareness about a system and users' state and behavior; (ii) automated reasoning about system/application state based on observations from monitoring tools; (iii) coordination of monitoring and system activities to provide a robust response to accidental failures and malicious attacks; and (iv) use of smart access control methods to reduce the attack surface and limit the likelihood of an unauthorized access to the system. Case studies covering different application domains, for example, cloud computing, large computing infrastructure for scientific applications, and industrial control systems, are used to show both the practicality of the proposed approaches and their capabilities, for example, in terms of detection coverage and performance cost.
Original languageEnglish (US)
Title of host publicationAssured Cloud Computing
EditorsRoy H. Campbell, Charles A. Kamhoua, Kevin A. Kwiat
PublisherWiley-IEEE Press
Pages81-132
ISBN (Electronic)9781119428497
ISBN (Print)9781119428633
DOIs
StatePublished - Dec 20 2018

Keywords

  • attribute-based access control
  • system reliability
  • shared computing infrastructure
  • role-based access control
  • resilient cloud computing
  • passive system monitoring
  • hypervisor probes
  • dynamic system monitoring

Fingerprint

Dive into the research topics of 'Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control'. Together they form a unique fingerprint.

Cite this