Event-Based Moving Target Defense in Cloud Computing With VM Migration: A Performance Modeling Approach

被引:2
作者
Santos, Lucas [1 ]
Brito, Carlos [1 ]
Fe, Iure [1 ]
Carvalho, Juliana [1 ]
Torquato, Matheus [2 ]
Choi, Eunmi [3 ]
Min, Dugki [4 ]
Lee, Jae-Woo [5 ]
Nguyen, Tuan Anh [6 ]
Silva, Francisco Airton [1 ]
机构
[1] Fed Univ Piaui UFPI, Lab Appl Res Distributed Syst PASID, BR-64049550 Picos, Piaui, Brazil
[2] Inst Fed Alagoas IFAL, BR-57035350 Arapiraca, Alagoas, Brazil
[3] Kookmin Univ, Coll Comp Sci, Sch Software, Seoul 02707, South Korea
[4] Konkuk Univ, Coll Engn, Dept Comp Sci & Engn, Seoul 05029, South Korea
[5] Konkuk Univ, Dept Aerosp Informat Engn, Seoul 05029, South Korea
[6] Konkuk Univ, Konkuk Aerosp Design Airworthiness Res Inst KADA, Seoul 05029, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Security; Analytical models; Stochastic processes; Petri nets; Computational modeling; Time factors; Throughput; Computer security; Moving target defense; IDS; migration; cybersecurity; performance; Petri Nets; VIRTUAL MACHINE MIGRATION;
D O I
10.1109/ACCESS.2024.3393998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The domain of information security is undergoing significant evolution to address the increasingly complex challenges aimed at bolstering system resilience against attacks. The Moving Target Defense (MTD) methodology, which entails altering the system's configuration-for instance, by relocating virtual machines (VM) or modifying IP addresses-serves to dynamically modify vulnerable components of a system. This strategy effectively disorients potential attackers, complicating their efforts to comprehend or anticipate the system's configuration. Moreover, MTD can be proactively utilized by, for example, relocating VMs from a network segment that has been compromised. Consequently, MTD emerges as a viable approach for mitigating security concerns, particularly within cloud computing frameworks. A critical facet of MTD involves the system migration across different hardware, presenting logistical and strategic challenges that necessitate a thorough evaluation of factors such as operational downtime and the impact on system performance. Analytical models, particularly those based on stochastic Petri nets (SPN), offer a methodological advantage in strategizing MTD implementations by facilitating the assessment of potential outcomes in a non-live environment. This paper proposes an advanced model that extends prior research through the integration of an event-based MTD mechanism, which encompasses both the probability of intrusion detection and the ability to discern potential threats. Through the application of diverse migration initiation policies, this study aims to identify more efficacious strategies under specific conditions. The findings indicate that reliance on event-detection policies is advantageous when the system possesses a detection accuracy exceeding 50%, underscoring the critical role of precise intrusion detection in the efficacy of MTD strategies.
引用
收藏
页码:165539 / 165554
页数:16
相关论文
共 36 条
  • [31] Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control
    Rubio-Medrano, Carlos E.
    Lamp, Josephine
    Taguinod, Marthony
    Doupe, Adam
    Zhao, Ziming
    Ahn, Gail-Joon
    ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, : 68 - 71
  • [32] Performance-Based Cyber Resilience Metrics: An Applied Demonstration Toward Moving Target Defense
    Hossain-Mckenzie, S.
    Lai, C.
    Chavez, A.
    Vugrin, E.
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 766 - 773
  • [33] Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment
    Kim, Minjune
    Cho, Jin-Hee
    Lim, Hyuk
    Moore, Terrence J.
    Nelson, Frederica F.
    Kim, Dan Dongseong
    2022 IEEE 27TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2022, : 119 - 129
  • [34] Design and Performance Analysis of Software Defined Networking based Web Services Adopting Moving Target Defense
    Kim, Dong Seong
    Kim, Minjune
    Cho, Jin-Hee
    Lim, Hyuk
    Moore, Terrence J.
    Nelson, Frederica F.
    2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 43 - 44
  • [35] Towards Enhancing the Endpoint Security using Moving Target Defense (Shuffle-based Approach) in Software Defined Networking
    Hyder, Muhammad Faraz
    Waseemullah
    Farooq, Muhammad Umer
    Ahmed, Usama
    Raza, Wajahat
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (04) : 7483 - 7488
  • [36] A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks
    Wang, Pengkun
    Zhou, Momiao
    Ding, Zhizhong
    SENSORS, 2021, 21 (07)