Method for detecting persistent attack of cloud storage system

A cloud storage system and detection method technology, applied in transmission systems, electrical components, etc., can solve problems such as the uncertainty of attack behavior and increase the difficulty of attack detection, so as to suppress attack motivation, suppress attack behavior, and improve data privacy performance Effect

Active Publication Date: 2017-05-03
XIAMEN UNIV +1
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, APT attack behavior is often affected by the subjectivity of the attacker,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting persistent attack of cloud storage system
  • Method for detecting persistent attack of cloud storage system
  • Method for detecting persistent attack of cloud storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following examples will further illustrate the present invention.

[0024] Embodiments of the present invention include the following steps:

[0025] 1) The defense system quantifies the scanning time interval x into 10 levels, x∈X=[0.1,0.2,...,1]. At the same time, observe the attack time interval and duration of the cloud storage device being attacked, and quantify the attack interval y and duration z into 10 levels, y∈[0.1,0.2,..,1], z∈[0.1,0.2 ,..,1]. The defense system provides detection services for all cloud storage devices on the cloud platform, and independently selects a scanning interval for each cloud storage device.

[0026] 2) Initialize the Q value matrix to 0, and the Q value matrix is ​​Q(s,x), which represents each available state s of the defense system, and assigns a corresponding Q value to all optional scanning time intervals x; where the defense system The state s of the state is the sum y+z of the attack time interval and duration of the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting a persistent attack of a cloud storage system, and relates to computer storage and information security. The provided method for detecting the persistent attack of the cloud storage system can realize an optimal equipment scanning time interval by adopting an intensive learning method without foreseeing a specific advanced persistent attack model, and can suppress the attack motive of an attacker, reduce the attack frequency and improve the data privacy of cloud storage. The provided method for detecting the persistent attack of the cloud storage system has the advantages that a defense system can design a detection scheme adaptive to a dynamic network and an attack mode according to the attack time interval and duration of an advanced persistent attack in cloud storage equipment and other similar information by intensive learning without knowing the specific advanced persistent attack model. The attack motive of an attacker can be suppressed, the attack frequency can be reduced, and the data privacy of cloud storage can be improved.

Description

technical field [0001] The invention relates to computer storage and information security, in particular to a detection method for advanced persistent attacks of cloud storage systems. Background technique [0002] In order to meet the rapidly growing mobile data volume and user computing needs, cloud computing technology provides dynamic data access, storage and computing services through the Internet. With the widespread application of financial payment and other services, cloud storage systems carry a large amount of privacy-sensitive data such as user financial payments and private files. Therefore, the security and privacy of cloud storage systems have become key factors restricting its future development. [0003] At present, technologies widely studied in cloud storage security include deduplication of cloud storage, hidden storage, data encryption and ciphertext search, and data integrity auditing, etc. The above technologies have also been deeply studied in defense ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1408H04L63/1441H04L67/1097
Inventor 肖亮许冬瑾范业仙谢彩霞
Owner XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products