Towards Abuse Detection and Prevention in IaaS Cloud Computing

被引:7
|
作者
Lindemann, Jens [1 ]
机构
[1] Univ Hamburg, Hamburg, Germany
关键词
D O I
10.1109/ARES.2015.72
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is frequently being used to host online services. Abuse of cloud resources poses an important problem for cloud service providers. If third parties are affected by abuse, bad publicity or legal liabilities may ensue for the provider. There is an unsatisfactory level of protection against abuse of cloud offerings at the moment. In this paper, we analyse the current state of abuse detection and prevention in IaaS cloud computing. To establish what constitutes abuse in an IaaS environment, a survey of acceptable use policies of cloud service providers was conducted. We have found that existing intrusion detection and prevention techniques are only of limited use in this environment due to the high level of control that users can exercise over their resources. However, cloud computing opens up different opportunities for intrusion detection. We present possible approaches for abuse detection, which we plan to investigate further in future work.
引用
收藏
页码:211 / 217
页数:7
相关论文
共 50 条
  • [31] A Mathematical Network Model and a Solution Algorithm for IaaS Cloud Computing
    Gabriella Colajanni
    Patrizia Daniele
    [J]. Networks and Spatial Economics, 2022, 22 : 267 - 287
  • [32] A Mathematical Network Model and a Solution Algorithm for IaaS Cloud Computing
    Colajanni, Gabriella
    Daniele, Patrizia
    [J]. NETWORKS & SPATIAL ECONOMICS, 2022, 22 (02): : 267 - 287
  • [33] CLOUD COMPUTING: A REVIEW OF PAAS, IAAS, SAAS SERVICES AND PROVIDERS
    Salas-Zarate, Maria
    Colombo-Mendoza, Luis
    [J]. REVISTA DIGITAL LAMPSAKOS, 2012, (07): : 47 - 57
  • [34] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [35] An intrusion detection and prevention system in cloud computing: A systematic review
    Patel, Ahmed
    Taghavi, Mona
    Bakhtiyari, Kaveh
    Celestino Junior, Joaquim
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 25 - 41
  • [36] Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
    Schmidt, Matthias
    Baumgaertner, Lars
    Graubner, Pablo
    Boeck, David
    Freisleben, Bernd
    [J]. PROCEEDINGS OF THE 19TH INTERNATIONAL EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2011, : 603 - 610
  • [37] A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing
    Alam, Shadab
    Shuaib, Mohammed
    Samad, Abdus
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 231 - 240
  • [38] Towards Providing Resource Management in a Local IaaS Cloud Architecture
    Brummett, Travis
    Galloway, Michael
    [J]. INFORMATION TECHNOLOGY: NEW GENERATIONS, 2016, 448 : 413 - 423
  • [39] Modeling an IaaS Broker based on two Cloud Computing Reference Models
    Teixeira, Juliana
    Salgado, Carlos E.
    Machado, Ricardo J.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING WORKSHOP (IC2EW), 2016, : 166 - 171
  • [40] Data-Driven Auction Mechanism Design in IaaS Cloud Computing
    Jiang, Chunxiao
    Chen, Yan
    Wang, Qi
    Liu, K. J. Ray
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (05) : 743 - 756