Event-Based Moving Target Defense in Cloud Computing With VM Migration: A Performance Modeling Approach

被引:2
作者
Santos, Lucas [1 ]
Brito, Carlos [1 ]
Fe, Iure [1 ]
Carvalho, Juliana [1 ]
Torquato, Matheus [2 ]
Choi, Eunmi [3 ]
Min, Dugki [4 ]
Lee, Jae-Woo [5 ]
Nguyen, Tuan Anh [6 ]
Silva, Francisco Airton [1 ]
机构
[1] Fed Univ Piaui UFPI, Lab Appl Res Distributed Syst PASID, BR-64049550 Picos, Piaui, Brazil
[2] Inst Fed Alagoas IFAL, BR-57035350 Arapiraca, Alagoas, Brazil
[3] Kookmin Univ, Coll Comp Sci, Sch Software, Seoul 02707, South Korea
[4] Konkuk Univ, Coll Engn, Dept Comp Sci & Engn, Seoul 05029, South Korea
[5] Konkuk Univ, Dept Aerosp Informat Engn, Seoul 05029, South Korea
[6] Konkuk Univ, Konkuk Aerosp Design Airworthiness Res Inst KADA, Seoul 05029, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Security; Analytical models; Stochastic processes; Petri nets; Computational modeling; Time factors; Throughput; Computer security; Moving target defense; IDS; migration; cybersecurity; performance; Petri Nets; VIRTUAL MACHINE MIGRATION;
D O I
10.1109/ACCESS.2024.3393998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The domain of information security is undergoing significant evolution to address the increasingly complex challenges aimed at bolstering system resilience against attacks. The Moving Target Defense (MTD) methodology, which entails altering the system's configuration-for instance, by relocating virtual machines (VM) or modifying IP addresses-serves to dynamically modify vulnerable components of a system. This strategy effectively disorients potential attackers, complicating their efforts to comprehend or anticipate the system's configuration. Moreover, MTD can be proactively utilized by, for example, relocating VMs from a network segment that has been compromised. Consequently, MTD emerges as a viable approach for mitigating security concerns, particularly within cloud computing frameworks. A critical facet of MTD involves the system migration across different hardware, presenting logistical and strategic challenges that necessitate a thorough evaluation of factors such as operational downtime and the impact on system performance. Analytical models, particularly those based on stochastic Petri nets (SPN), offer a methodological advantage in strategizing MTD implementations by facilitating the assessment of potential outcomes in a non-live environment. This paper proposes an advanced model that extends prior research through the integration of an event-based MTD mechanism, which encompasses both the probability of intrusion detection and the ability to discern potential threats. Through the application of diverse migration initiation policies, this study aims to identify more efficacious strategies under specific conditions. The findings indicate that reliance on event-detection policies is advantageous when the system possesses a detection accuracy exceeding 50%, underscoring the critical role of precise intrusion detection in the efficacy of MTD strategies.
引用
收藏
页码:165539 / 165554
页数:16
相关论文
empty
未找到相关数据