Event-Based Moving Target Defense in Cloud Computing With VM Migration: A Performance Modeling Approach

被引:2
|
作者
Santos, Lucas [1 ]
Brito, Carlos [1 ]
Fe, Iure [1 ]
Carvalho, Juliana [1 ]
Torquato, Matheus [2 ]
Choi, Eunmi [3 ]
Min, Dugki [4 ]
Lee, Jae-Woo [5 ]
Nguyen, Tuan Anh [6 ]
Silva, Francisco Airton [1 ]
机构
[1] Fed Univ Piaui UFPI, Lab Appl Res Distributed Syst PASID, BR-64049550 Picos, Piaui, Brazil
[2] Inst Fed Alagoas IFAL, BR-57035350 Arapiraca, Alagoas, Brazil
[3] Kookmin Univ, Coll Comp Sci, Sch Software, Seoul 02707, South Korea
[4] Konkuk Univ, Coll Engn, Dept Comp Sci & Engn, Seoul 05029, South Korea
[5] Konkuk Univ, Dept Aerosp Informat Engn, Seoul 05029, South Korea
[6] Konkuk Univ, Konkuk Aerosp Design Airworthiness Res Inst KADA, Seoul 05029, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Security; Analytical models; Stochastic processes; Petri nets; Computational modeling; Time factors; Throughput; Computer security; Moving target defense; IDS; migration; cybersecurity; performance; Petri Nets; VIRTUAL MACHINE MIGRATION;
D O I
10.1109/ACCESS.2024.3393998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The domain of information security is undergoing significant evolution to address the increasingly complex challenges aimed at bolstering system resilience against attacks. The Moving Target Defense (MTD) methodology, which entails altering the system's configuration-for instance, by relocating virtual machines (VM) or modifying IP addresses-serves to dynamically modify vulnerable components of a system. This strategy effectively disorients potential attackers, complicating their efforts to comprehend or anticipate the system's configuration. Moreover, MTD can be proactively utilized by, for example, relocating VMs from a network segment that has been compromised. Consequently, MTD emerges as a viable approach for mitigating security concerns, particularly within cloud computing frameworks. A critical facet of MTD involves the system migration across different hardware, presenting logistical and strategic challenges that necessitate a thorough evaluation of factors such as operational downtime and the impact on system performance. Analytical models, particularly those based on stochastic Petri nets (SPN), offer a methodological advantage in strategizing MTD implementations by facilitating the assessment of potential outcomes in a non-live environment. This paper proposes an advanced model that extends prior research through the integration of an event-based MTD mechanism, which encompasses both the probability of intrusion detection and the ability to discern potential threats. Through the application of diverse migration initiation policies, this study aims to identify more efficacious strategies under specific conditions. The findings indicate that reliance on event-detection policies is advantageous when the system possesses a detection accuracy exceeding 50%, underscoring the critical role of precise intrusion detection in the efficacy of MTD strategies.
引用
收藏
页码:165539 / 165554
页数:16
相关论文
共 50 条
  • [1] A Stealth Migration Approach to Moving Target Defense in Cloud Computing
    Das, Saikat
    Mahfouz, Ahmed M.
    Shiva, Sajjan
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 1, 2020, 1069 : 394 - 410
  • [2] Security and Availability Modeling of VM Migration as Moving Target Defense
    Torquato, Matheus
    Maciel, Paulo
    Vieira, Marco
    2020 IEEE 25TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2020), 2020, : 50 - 59
  • [3] Hybrid Live VM Migration: An Efficient Live VM Migration Approach in Cloud Computing
    Shakya, Abhishek Ku
    Garg, Deepak
    Nayak, Prakash Ch
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2018, PT I, 2019, 955 : 600 - 611
  • [4] Moving target defense in cloud computing: A systematic mapping study
    Torquato, Matheus
    Vieira, Marco
    COMPUTERS & SECURITY, 2020, 92
  • [5] Analysis of VM Migration Scheduling as Moving Target Defense against insider attacks
    Torquato, Matheus
    Maciel, Paulo
    Vieira, Marco
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 194 - 202
  • [6] Combating the Bandits in the Cloud: A Moving Target Defense Approach
    Penner, Terry
    Guirguis, Mina
    2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, : 411 - 420
  • [7] Software Rejuvenation Meets Moving Target Defense: Modeling of Time-Based Virtual Machine Migration Approach
    Torquato, Matheus
    Maciel, Paulo
    Vieira, Marco
    2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, : 205 - 216
  • [8] PMM: A Novel Prediction Based VM Migration Scheme in Cloud Computing
    Bhattacherjee, Srimoyee
    Sarkar, Uttiya
    Khatua, Sunirmal
    Roy, Sarbani
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, (ICDCIT 2017), 2017, 10109 : 107 - 117
  • [9] VM Migration Scheduling as Moving Target Defense against Memory DoS Attacks: An Empirical Study
    Torquato, Matheus
    Vieira, Marco
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [10] Modeling terrorism culpability: An event-based approach
    Hill, Joshua B.
    Mabrey, Daniel J.
    Miller, John M.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2013, 10 (02): : 181 - 191