Font Size: a A A

Research On Security Situation Assessment Method Of Cloud Computing Environment

Posted on:2021-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:C H LiFull Text:PDF
GTID:2428330614470806Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The use of security situation assessment technology to manage the security status of cloud computing systems is a major development trend in the cloud computing industry.Cloud computing technology is rapidly and widely developed due to its resource sharing,flexible configuration and on-demand services,and has become an important resource in today's society.However,cloud computing is not always smooth in the process of development and operation.Cloud computing has faced serious security threats since its birth.Security issues have always been a major problem that plagues enterprise users,cloud service providers and governments,and is one of the main obstacles to the development of cloud computing.Therefore,protecting the security of cloud computing has become a critical issue.However,traditional network defense tools have a single function and are independent of each other.They can only passively defend against unilateral security issues.They cannot monitor the security status in the network in real time,nor can they reflect the security status of the cloud computing environment in general;In addition,the huge and complex cloud computing environment makes it difficult for network security administrators to have an overall macro understanding and control over the security of cloud computing systems.Therefore,this thesis applies the network security situation assessment method to the research of cloud computing security,and explores the new security situation assessment method applicable to the cloud computing environment,which has practical significance for promoting the scientific development of cloud computing.Based on the actual construction of cloud computing systems,this thesis designs a security situation assessment model for cloud computing environments based on risk assessment methods to achieve an accurate and comprehensive assessment of the future security situation of cloud virtualization environment.The thesis mainly completes the following three aspects of work:(1)Designed a cloud computing security situation assessment model based on risk analysis.The model is based on the risk level that the system may face,and considers the logical relationship between vulnerabilities,threats,and three-dimensional situation indicators of assets.It has good reliability and practicality for the security management of cloud computing environment.(2)Propose a risk prediction model that predicts the possibility of threats in the future,and introduce logistic regression and support vector machine regression models in machine learning algorithms to predict the possibility of threats in the future.The application of this method avoids the disadvantages of traditional network security management that completely relies on past data and cannot sense the security status of the system in real time.At the same time,the prediction results are added to the input of the fuzzy decision system to improve the accuracy of the assessment.(3)Propose a risk evaluation and decision-making method based on fuzzy logic.The introduction of fuzzy method solves the problems of excessive dependence on expert experience,strong subjectivity,insufficient safety information or inaccuracy in the past evaluation process,and makes the proposed evaluation model have better data scalability.Through the case analysis,the application of the security situation awareness method in the cloud computing environment proposed in this thesis is introduced,and the effectiveness and practicability of the method in the actual production environment are verified.The method proposed in this article can realize the perception of the security situation changes in the cloud computing environment,which can help practitioners detect and handle risks before actual attacks occur.
Keywords/Search Tags:Cloud Computing Security, Security Domain, Situation Assessment, Risk Prediction, Fuzzy Decision
PDF Full Text Request
Related items