, <?xml version ="1.0" encoding ="utf-8"?> 2 <xs:schema xmlns:xs=
, <xs:appinfo>ECSLA, a DSL for security monitoring SLA description in cloud</xs:appinfo> 8 <xs:documentation xml:lang="en
, Schema for the ECSLA, an extention for CSLA Language
, , p.documentation>
, CloudServiceType "> 16 <xs:choice > 17 <xs:element numbersname=" software " numberstype="csla: SoftwareType " 18 numbersminOccurs ="1" numbersmaxOccurs ="1"/> 19 <xs:element numbersname=" platform " numberstype="csla: PlatformType, </xs:annotation> 14 15 <xs:complexType numbersname=
,
, SecurityMonitoringType "> 29 <xs:sequence > 30 <xs:element numbersname=" product " numberstype="csla: ProductType " numbersminOccurs ="1" 31 numbersmaxOccurs =" unbounded "/> 32 <xs:element numbersname=" vulnerabilities " numberstype="csla: VulnerabilitiesType " 33 numbersminOccurs ="0" numbersmaxOccurs =" unbounded "/> 34 <xs:element numbersname=, </xs:complexType > 27 28 <xs:complexType numbersname=
, </xs:sequence >
ProductType "> 40 <xs:sequence > 41 <xs:element numbersname="mode" numberstype="csla: ModeType " numbersminOccurs ="1" 42 numbersmaxOccurs ,
, </xs:sequence > 44 <xs:attribute numbersname="id" numberstype="xs:string "/> 45 <xs:attribute numbersname="name" numberstype="xs:string "/> 46 <xs:attribute numbersname="mode" numberstype="xs:integer "/> 47 <xs:attribute numbersname=" version " numberstype="xs:string "/>
, complexType > 58 </xs:complexType > 59 60 <xs:complexType numbersname=" VulnerabilityType "> 61 <xs:attribute numbersname="id" numberstype="xs:string "/> 62 <xs:attribute numbersname="cve" numberstype="xs:string "/> 63 <xs:attribute numbersname=" description " numberstype="xs:string "/>
MetricType"> 68 <xs:sequence> 69 <xs:element name="description" type="xs:string" minOccurs="1" maxOccurs="1"/> 70 <xs:element name= ,
, </xs:sequence> 72 <xs:attribute name="id" type="xs:string"/> 73 <xs:attribute name="name" type="xs:string"/>
Type can be simple of complex --> 75 <xs:attribute name="type" type="xs:string"/> 76 <xs:attribute name= ,
,
,
Verification for security monitoring slas in iaas clouds: The example of a network ids, NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp.1-7, 2018. ,
Csla: a language for improving cloud sla management, International Conference on Cloud Computing and Services Science, pp.586-591, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00675077
The Tao of network security monitoring: beyond intrusion detection. Pearson Education, 2004. ,
, Practical guide to cloud service level agreements version 2.0, Cloud Standards Customer Council (CSCC), 2015.
The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM Conference on Computer and Communications Security, pp.1-7, 1999. ,
Web service level agreement (wsla) language specification ,
Web services agreement specification (ws-agreement), Open grid forum, vol.128, p.216, 2007. ,
Slang: A language for defining service level agreements, NINTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, pp.100-106, 2003. ,
Slac: A formal service-level-agreement language for cloud computing, Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, pp.419-426, 2014. ,
Balancing risk and reward in a market-based task service, pp.160-169, 2004. ,
, GFD.224 -Open Cloud Computing Interface -Infrastructure, 2018.
SLA-driven cloud elasticity anagement approach, Theses, Ecole des Mines de Nantes, 2013. ,
URL : https://hal.archives-ouvertes.fr/tel-00919900
Service level agreements for cloud computing, 2011. ,
, Common Vulnerabilities and Exposures, 2018.
Measuring intrusion detection capability: an information-theoretic approach, Proceedings of the 2006 ACM Symposium on Information, pp.90-101, 2006. ,
, Amazon Compute Service Level Agreement, 2018.
Adding virtualization capabilities to the Grid'5000 testbed," in Cloud Computing and Services Science, ser. Communications in Computer and Information Science, vol.367, pp.3-20, 2013. ,
, Open source software for creating private and public clouds, 2018.
, Open vSwitch is a production quality, multilayer virtual switch, 2018.
, An open source intrusion detection and prevention system, 2018.
A quality metric for ids signatures: in the wild the size matters, EURASIP Journal on Information Security, vol.2013, issue.1, p.7, 2013. ,
Quantifying the attack detection accuracy of intrusion detection systems in virtualized environments, Software Reliability Engineering (ISSRE), pp.276-286, 2016. ,
, Open Source vulnerability scanner and manager (OpenVAS), 2018.
,
,
,
, Extended Cloud Service Level Agreement (ECSLA), vol.8
,
,
, Including Unknown Base Rate Values in SLO 14
,
, Modeling Rule Interference and its Effect on NIDS Performance, p.17
, 18 6.2.3 Interference vector (IV) and interference matrix (IM)
, Building a Knowledge Base by Clustering Vulnerabilities, p.23
,
, Collecting Data Points and Generating an Estimation Model, p.25
27 7.3.2 Grouping based on attack type and severity ,
,
, Conclusion and Future Work 30
,
, , p.33
,