A Streaming Intrusion Monitoring and Classification System for IaaS Cloud

被引:0
|
作者
Nikolai, Jason [1 ]
Wang, Yong [2 ]
机构
[1] Dakota State Univ, Coll Business & Informat Syst, Madison, SD 57042 USA
[2] Dakota State Univ, Coll Comp, Madison, SD 57042 USA
关键词
D O I
10.1109/CLOUD.2016.87
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To secure IaaS cloud environments, multiple layers of security mechanisms must be deployed and monitored. When a threat is detected, it must be appropriately acted upon. A common problem with monitoring such approaches is the sheer volume of alarms generated. Some alerts may be false positives, others are informational. It is challenging for cloud providers to quickly interpret which events to act upon and the priority of events. Another challenge is the dynamic nature of cloud environments. Tenant instances and security sensors may come and go. Systems that depend on the existence of a particular sensor are less effective in IaaS environments. Our work supports a defense in depth approach by leveraging multiple distributed intrusion detection and security system sensors in an IaaS cloud computing environment. We propose and demonstrate a streaming cloud intrusion monitoring and classification system (SCIMCS) to assist cloud providers with multiple security systems by filtering noisy alert messages and classifying previously recognized attacks. Our approach consists of three steps: Summarize and Score, Detect Anomalies, and Classify Attacks. We demonstrate the effectiveness of our framework in an IaaS cloud environment running Eucalyptus where we execute real attacks with a total alert reduction of 95.9 percent and a zero miss rate for problematic alarms. In addition, we demonstrate a 100 percent classification rate for trained attacks.
引用
收藏
页码:632 / 639
页数:8
相关论文
共 50 条
  • [1] CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
    Li, Bo
    Li, Jianxin
    Liu, Lu
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 1861 - 1885
  • [2] On Implementation of a KVM IaaS with Monitoring System on Cloud Environments
    Yang, Chao-Tung
    Chen, Bo-Han
    Chen, Wei-Sheng
    [J]. COMMUNICATION AND NETWORKING, PT I, 2011, 265 : 300 - 309
  • [3] Agent based Resource Monitoring system in IaaS Cloud Environment
    Meera, A.
    Swamynathan, S.
    [J]. FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 200 - 207
  • [4] Online Malware Classification with System-Wide System Calls in Cloud IaaS
    Brown, Phillip
    Brown, Austin
    Gupta, Maanak
    Abdelsalam, Mahmoud
    [J]. 2022 IEEE 23RD INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2022), 2022, : 146 - 151
  • [5] IaaS type Cloud infrastructure assessment and monitoring
    Kozlovszky, M.
    Toerocsik, M.
    Schubert, T.
    Poserne, V.
    [J]. 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 249 - 252
  • [6] Monitoring IaaS using various cloud monitors
    Stephen, Absa
    Benedict, Shajulin
    Kumar, R. P. Anto
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12459 - 12471
  • [7] Monitoring IaaS using various cloud monitors
    Absa Stephen
    Shajulin Benedict
    R. P. Anto Kumar
    [J]. Cluster Computing, 2019, 22 : 12459 - 12471
  • [8] Clustering-Based IaaS Cloud Monitoring
    Abdelsalam, Mahmoud
    Krishnan, Ram
    Sandhu, Ravi
    [J]. 2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 672 - 679
  • [9] Cloud Monitoring and Discovery Service (CMDS) for IaaS resources
    Selvi, S. Thamarai
    Kannan, G.
    [J]. 2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011, : 340 - 345
  • [10] Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment
    Moorthy, S. Manthira
    Masillamani, M. Roberts
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 53 - 64