Conducive Tracking, Monitoring, and Managing of Cloud Resources

Authors

  • E. Soumya  B.Tech,Department of Computer Science and Engineering, St. Martins Engineering College, Hyderabad, Telangana, India
  • V. Santhosh Kumar  B.Tech,Department of Computer Science and Engineering, St. Martins Engineering College, Hyderabad, Telangana, India
  • T. Vineela  B.Tech,Department of Computer Science and Engineering, St. Martins Engineering College, Hyderabad, Telangana, India
  • M. Aishwarya  

Keywords:

Infrastructure As A Service, Cloud, Tracking, Monitoring, Anomaly Detection, Virtual Machine Introspection

Abstract

The development of Infrastructure as a Service structure brings new openings, which additionally goes with new difficulties in auto scaling, resource allocation, and security. A major test supporting these issues is the consistent tracking, monitoring and managing of cloud resources in the framework. In this paper, we propose ATOM, a capable and fruitful system to consequently track, screen, and oversee assets utilized as a part of an Infrastructure as a Service (IaaS) structure that is by and large used as a piece of cloud foundation. We utilize novel tracking technique to persistently track essential framework utilization measurements with low overhead,and build up a Principal Component Analysis (PCA) based way to deal with constantly monitor and consequently discover abnormalities in view of the approximated tracking results. We show how to dynamically set the tracking threshold based on the detection results, and further, how to adjust tracking algorithm to ensure its optimality under dynamic workloads. We exhibit the extensibility of ATOM through virtual machine (VM) clustering. In conclusion, when potential anomalies are recognized, we utilize introspection tools to perform memory forensics on VMs guided by analyzed results from tracking and monitoring to find malevolent behavior inside a VM. We assess the performance of our framework in an open source IaaS framework.

References

  1. Amazon.http://www.aws.amazon.com/.Accessed Nov.5, 2016.
  2. http://www.itworld.com/security/428920/attackers-install-ddos-bots-amazon-cloud-exploiting-elasticsearch-weakness.Accessed Nov.5, 2016.
  3. Amazon.AWS Best Practices for DDoS Resiliency.https://d0.awsstatic.com/whitepapers/DDoS White Paper June2015.pdf.Accessed Nov.5, 2016.
  4. Eucalyptus.http://www8.hp.com/us/en/cloud/helion-eucalyptus.html.Accessed Nov.5, 2016.
  5. D.Nurmi, R.Wolski, C.Grzegorczyk, G.Obertelli, S.Soman, L.Yous-eff, and D.Zagorodnov, "The eucalyptus open-source cloud-computing system," in CCGRID, 2009.
  6. W.Dawoud, I.Takouna, and C.Meinel, "Infrastructure as a service security: Challenges and solutions," in INFOS, 2010.
  7. D.J.Dean, H.Nguyen, and X.Gu, "Ubl: Unsupervised behavior learning for predicting performance anomalies in virtualized cloud systems," in ICAC, 2012.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
E. Soumya, V. Santhosh Kumar, T. Vineela, M. Aishwarya, " Conducive Tracking, Monitoring, and Managing of Cloud Resources, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.385-390, March-April-2018.