Flow Based Analysis of Advanced Persistent Threats Detecting Targeted Attacks in Cloud Computing

被引:0
|
作者
Vance, Andrew [1 ]
机构
[1] Univ Maryland Univ Coll, Dept Cybersecur & Informat Assurance, Washington, DC USA
关键词
Advanced Persistent Threats; Cloud Computing; Cyber Security; Flow Based Analysis; Threat Detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides industry, government, and academic users' convenient and cost-effective access to distributed services and shared data via the Internet. Due to its distribution of diverse users and aggregation of immense data, cloud computing has increasingly been the focus of targeted attacks. Meta-analysis of industry studies and retrospective research involving cloud service providers reveal that cloud computing is demonstrably vulnerable to a particular type of targeted attack, Advanced Persistent Threats (APTs). APTs have proven to be difficult to detect and defend against in cloud based infocommunication systems. The prevalent use of polymorphic malware and en-crypted covert communication channels make it difficult for existing packet inspecting and signature based security technologies such as; firewalls, intrusion detection sensors, and anti-virus systems to detect APTs. In this paper, we examine the application of an alternative security approach which applies an algorithm derived from flow based monitoring to successfully detect APTs. Results indicate that statistical modeling of APT communications can successfully develop deterministic characteristics for detection is a more effective and efficient way to protect against APTs.
引用
收藏
页码:173 / 176
页数:4
相关论文
共 50 条
  • [41] Evidence-Based Detection of Advanced Persistent Threats
    Tecuci, Gheorghe
    Marcu, Dorin
    Meckl, Steven
    Boicu, Mihai
    [J]. COMPUTING IN SCIENCE & ENGINEERING, 2018, 20 (06) : 54 - 65
  • [42] Advanced Hybrid Technique in Detecting Cloud Web Application's Attacks
    Amar, Meryem
    Lemoudden, Mouad
    El Ouahidi, Bouabid
    [J]. MACHINE LEARNING FOR NETWORKING, 2019, 11407 : 79 - 97
  • [43] Defense scheme against advanced persistent threats in mobile fog computing security
    Waqas, Muhammad
    Tu, Shanshan
    Wan, Jialin
    Mir, Talha
    Alasmary, Hisham
    Abbas, Ghulam
    [J]. COMPUTER NETWORKS, 2023, 221
  • [44] Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study
    Xiao, Liang
    Xu, Dongjin
    Xie, Caixia
    Mandayam, Narayan B.
    Poor, H. Vincent
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (03) : 534 - 544
  • [45] Prospect Theoretic Study of Cloud Storage Defense Against Advanced Persistent Threats
    Xu, Dongjin
    Li, Yanda
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [46] Detecting DDoS attacks in cloud computing using ANN and black hole optimization
    Kushwah, Gopal Singh
    Ali, Syed Taqi
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 355 - 359
  • [47] ANALYSIS OF VARIOUS VIRTUAL MACHINE ATTACKS IN CLOUD COMPUTING
    Annapoorani, S.
    Srinivasan, B.
    Mylavathi, G. A.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1016 - 1019
  • [48] Comparative Analysis of Security Threats in Mobile Cloud Computing Environment
    Vishal
    Kaur, Bikrampal
    Jangra, Surender
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 385 - 390
  • [49] Study on DDoS Attacks based on DPDK in Cloud Computing
    Zhao, Xutao
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [50] Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threats
    Amir Mohammadzade Lajevardi
    Morteza Amini
    [J]. Journal of Big Data, 8