Extrusion detection of illegal files in cloud-based systems

被引:15
|
作者
Hegarty, Rob [1 ]
Haggerty, John [2 ]
机构
[1] Manchester Metropolitan Univ, Sch Comp Math & Digital Technol, Manchester M1 5GD, Lancs, England
[2] Nottingham Trent Univ, Sch Sci & Technol, Clifton Campus, Nottingham NG11 8NS, England
关键词
cloud security; privacy and trust; extrusion detection;
D O I
10.1504/IJSSC.2015.070954
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-based architectures have become the predominant paradigm for organisational infrastructure development due to the flexibility and scalability that these systems provide. However, issues around privacy and trust in such environments remain as has been demonstrated in recent attacks. There are two security challenges for cloud providers to resolve. First, they must ensure that only authorised downloads of potentially sensitive data can be made and they should have a means by which to detect any malicious activities. Second, any files that are uploaded to cloud providers must adhere to geographical legalities. Current security mechanisms employed in the cloud, such as firewalls and intrusion detection systems, find these issues problematic. This paper therefore presents a novel approach, XDet, for the extrusion detection of illegal files being maliciously uploaded to or downloaded from the cloud, which can be used in conjunction with other security countermeasures to ensure robust and secure cloud systems. This is achieved through the creation and detection of signatures from files of interest within the cloud network environment. The feasibility and performance study in this paper, whereby XDet has been applied to network traffic to detect files of interest, demonstrates the applicability of this approach.
引用
收藏
页码:150 / 158
页数:9
相关论文
共 50 条
  • [1] Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems
    Cherkaoui, Rachid
    Zbakh, Mostapha
    Braeken, An
    Touhafi, Abdellah
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 206 - 213
  • [2] Detection and mitigation of deception attacks on cloud-based industrial control systems
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    [J]. 25TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS (ICIN 2022), 2022, : 106 - 110
  • [3] Cloud-Based Manufacturing and Service Systems
    Chen, Tin-Chih Toly
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2017, 32 (04)
  • [4] Evaluating robustness of cloud-based systems
    Chauvel, Franck
    Song, Hui
    Ferry, Nicolas
    Fleurey, Franck
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2015, 4
  • [5] Towards Cloud-Based Engineering Systems
    Martins, Joao
    Camarinha-Matos, Luis M.
    Goes, Joao
    Gomes, Luis
    [J]. TECHNOLOGICAL INNOVATION FOR CLOUD-BASED ENGINEERING SYSTEMS, 2015, 450 : 3 - 10
  • [6] Cloud-Based Information Systems Management
    Levy, Richard
    [J]. IMCIC 2010: INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL II, 2010, : 96 - 101
  • [7] Risk Assessment for Cloud-Based IT Systems
    Chou, Yuyu
    Oetting, Jan
    [J]. INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2011, 3 (02) : 1 - 13
  • [8] Consistency in Cloud-based Database Systems
    Mahfoud, Zohra
    Nouali-Taboudjemat, Nadia
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2019, 43 (03): : 313 - 319
  • [9] Cloud-based cyber-physical systems in manufacturing Cloud-based cyber-physical systems in manufacturing
    Majstorovic, Vidosav D.
    [J]. PRODUCTION PLANNING & CONTROL, 2020, 31 (07) : 611 - 612
  • [10] A systematic literature review of intrusion detection systems in the cloud-based IoT environments
    Luo, Gang
    Chen, Zhiyuan
    Mohammed, Bayan Omar
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (10):