Toward deceiving the intrusion attacks in containerized cloud environment using virtual private cloud-based moving target defense

被引:1
|
作者
Hyder, Muhammad Faraz [1 ]
Ahmed, Waqas [2 ]
Ahmed, Maaz [2 ]
机构
[1] NED Univ Engn & Technol, Natl Ctr Cyber Secur, Dept Software Engn, Karachi 75270, Pakistan
[2] NED Univ Engn & Technol, Dept Comp Sci & Informat Technol, Karachi, Pakistan
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2023年 / 35卷 / 05期
关键词
containerization; intrusion attacks; Kubernetes; moving target defense; virtual private cloud; SECURITY ISSUES;
D O I
10.1002/cpe.7549
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The container-based cloud has its distinct security challenges. In this article, moving target defense (MTD) is used to increase the cost and effort of the attacker to exploit resources and follow an attack path to compromise the critical resources in a container-based cloud. The existing MTD mechanisms for cloud have not focused on intruder prevention inside containerized environment. The proposed solution is one of its kind that utilizes resource movement inside and across the virtual private network in the cloud to deceive intruders. The framework continuously changes the target/container to increase confusion about the routing path, so attackers cannot follow the simple attack path. This obscure cloud architecture increases the delay in attack and gives system/network administrators significant time to use Intrusion Detection mechanisms for countering the attack. The proposed scheme is implemented on the Google Cloud Platform (GCP) by using an extensive network of nodes hosting the stateful pods that are created and destroyed periodically. The experimental analysis confirmed that the proposed scheme substantially increased the attack path length and added obscurity at a low computation cost. However, as per experiments, implementing the proposed scheme in GCP slightly increases the dollar cost.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
    Bardas, Alexandru G.
    Sundaramurthy, Sathya Chandran
    Ou, Xinming
    DeLoach, Scott A.
    COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 167 - 186
  • [2] Cloud-Based Healthcare Portal in Virtual Private Cloud
    Mahaveerakannan, R.
    Dhas, C. Suresh Gnana
    Devi, R. Rama
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1071 - 1080
  • [3] Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud
    Sengupta, Sailik
    Chowdhary, Ankur
    Huang, Dijiang
    Kambhampati, Subbarao
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 326 - 345
  • [4] Analyzing Moving Target Defense for Resilient Campus Private Cloud
    Minh Nguyen
    Samanta, Priyanka
    Debroy, Saptarshi
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 114 - 121
  • [5] Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security
    Rekha, M.
    Rani, Shoba P.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (04): : 1 - 7
  • [6] A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment
    Gupta, Sanchika
    Horrow, Susmita
    Sardana, Anjali
    CONTEMPORARY COMPUTING, 2012, 306 : 498 - 499
  • [7] A Moving-target Defense Strategy for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces
    Peng, Wei
    Li, Feng
    Huang, Chin-Tser
    Zou, Xukai
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 804 - 809
  • [8] Cloud-based VCLE: a Virtual Collaborative Learning Environment Based on a Cloud Computing Architecture
    El Mhouti, Abderrahim
    Nasseh, Azeddine
    Erradi, Mohamed
    Marfa Vasquez, Jose
    PROCEEDINGS OF 2016 THIRD INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION (SYSCO), 2016, : P86 - P91
  • [9] Hephaestus: a cloud-based environment to virtual network automation
    Patricio, Roberio Gomes
    Celestino Junior, Joaquim
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [10] A Proposed Virtual Private Cloud-Based Disaster Recovery Strategy
    Hamadah, Siham
    Aqel, Darah
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 469 - 473