Event-Based Moving Target Defense in Cloud Computing With VM Migration: A Performance Modeling Approach

被引:2
|
作者
Santos, Lucas [1 ]
Brito, Carlos [1 ]
Fe, Iure [1 ]
Carvalho, Juliana [1 ]
Torquato, Matheus [2 ]
Choi, Eunmi [3 ]
Min, Dugki [4 ]
Lee, Jae-Woo [5 ]
Nguyen, Tuan Anh [6 ]
Silva, Francisco Airton [1 ]
机构
[1] Fed Univ Piaui UFPI, Lab Appl Res Distributed Syst PASID, BR-64049550 Picos, Piaui, Brazil
[2] Inst Fed Alagoas IFAL, BR-57035350 Arapiraca, Alagoas, Brazil
[3] Kookmin Univ, Coll Comp Sci, Sch Software, Seoul 02707, South Korea
[4] Konkuk Univ, Coll Engn, Dept Comp Sci & Engn, Seoul 05029, South Korea
[5] Konkuk Univ, Dept Aerosp Informat Engn, Seoul 05029, South Korea
[6] Konkuk Univ, Konkuk Aerosp Design Airworthiness Res Inst KADA, Seoul 05029, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Security; Analytical models; Stochastic processes; Petri nets; Computational modeling; Time factors; Throughput; Computer security; Moving target defense; IDS; migration; cybersecurity; performance; Petri Nets; VIRTUAL MACHINE MIGRATION;
D O I
10.1109/ACCESS.2024.3393998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The domain of information security is undergoing significant evolution to address the increasingly complex challenges aimed at bolstering system resilience against attacks. The Moving Target Defense (MTD) methodology, which entails altering the system's configuration-for instance, by relocating virtual machines (VM) or modifying IP addresses-serves to dynamically modify vulnerable components of a system. This strategy effectively disorients potential attackers, complicating their efforts to comprehend or anticipate the system's configuration. Moreover, MTD can be proactively utilized by, for example, relocating VMs from a network segment that has been compromised. Consequently, MTD emerges as a viable approach for mitigating security concerns, particularly within cloud computing frameworks. A critical facet of MTD involves the system migration across different hardware, presenting logistical and strategic challenges that necessitate a thorough evaluation of factors such as operational downtime and the impact on system performance. Analytical models, particularly those based on stochastic Petri nets (SPN), offer a methodological advantage in strategizing MTD implementations by facilitating the assessment of potential outcomes in a non-live environment. This paper proposes an advanced model that extends prior research through the integration of an event-based MTD mechanism, which encompasses both the probability of intrusion detection and the ability to discern potential threats. Through the application of diverse migration initiation policies, this study aims to identify more efficacious strategies under specific conditions. The findings indicate that reliance on event-detection policies is advantageous when the system possesses a detection accuracy exceeding 50%, underscoring the critical role of precise intrusion detection in the efficacy of MTD strategies.
引用
收藏
页码:165539 / 165554
页数:16
相关论文
共 50 条
  • [21] Maximum Correlationwith Migration Control Based On Modified Knapsack(MC_MC) Approach for VM Selection for Green Cloud Computing
    Khichar, Gopal Singh
    Gupta, Gaurav
    Singh, Ravinder
    Rathi, Rakesh
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 141 - 146
  • [22] A Performance Analysis of Precopy, Postcopy and Hybrid Live VM Migration Algorithms in Scientific Cloud Computing Environment
    Shah, Syed Asif Raza
    Jaikar, Amol Hindurao
    Noh, Seo-Young
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2015), 2015, : 229 - 236
  • [23] Design and modeling of moving target defense in workflow-based applications
    Alhozaimy, Sarah
    Menasce, Daniel A.
    Albanese, Massimiliano
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 945 - 958
  • [24] Design and modeling of moving target defense in workflow-based applications
    Sarah Alhozaimy
    Daniel A. Menascé
    Massimiliano Albanese
    Cluster Computing, 2024, 27 : 945 - 958
  • [25] Network moving target defense technique based on optimal forwarding path migration
    Lei C.
    Ma D.-H.
    Zhang H.-Q.
    Han Q.
    Yang Y.-J.
    Ma, Duo-He (maduohe@iie.ac.cn), 2017, Editorial Board of Journal on Communications (38): : 133 - 143
  • [26] Exponential gravitational search algorithm-based VM migration strategy for load balancing in cloud computing
    Polepally, Vijayakumar
    Chatrapati, K. Shahu
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2018, 9 (01)
  • [27] Model-based Performance Evaluation of a Moving Target Defense System
    Chen, Zhi
    Chang, Xiaolin
    Misic, Jelena
    Misic, Vojislav B.
    Yang, Yang
    Han, Zhen
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [28] A Load Balancing Game Approach for VM Provision Cloud Computing Based on Ant Colony Optimization
    Khiet Thanh Bui
    Tran Vu Pham
    Hung Cong Tran
    CONTEXT-AWARE SYSTEMS AND APPLICATIONS (ICCASA 2016), 2017, 193 : 52 - 63
  • [29] A dynamic VM consolidation approach based on load balancing using Pearson correlation in cloud computing
    Jean Pepe Buanga Mapetu
    Lingfu Kong
    Zhen Chen
    The Journal of Supercomputing, 2021, 77 : 5840 - 5881
  • [30] A dynamic VM consolidation approach based on load balancing using Pearson correlation in cloud computing
    Mapetu, Jean Pepe Buanga
    Kong, Lingfu
    Chen, Zhen
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (06): : 5840 - 5881