Toward deceiving the intrusion attacks in containerized cloud environment using virtual private cloud-based moving target defense

被引:1
|
作者
Hyder, Muhammad Faraz [1 ]
Ahmed, Waqas [2 ]
Ahmed, Maaz [2 ]
机构
[1] NED Univ Engn & Technol, Natl Ctr Cyber Secur, Dept Software Engn, Karachi 75270, Pakistan
[2] NED Univ Engn & Technol, Dept Comp Sci & Informat Technol, Karachi, Pakistan
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2023年 / 35卷 / 05期
关键词
containerization; intrusion attacks; Kubernetes; moving target defense; virtual private cloud; SECURITY ISSUES;
D O I
10.1002/cpe.7549
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The container-based cloud has its distinct security challenges. In this article, moving target defense (MTD) is used to increase the cost and effort of the attacker to exploit resources and follow an attack path to compromise the critical resources in a container-based cloud. The existing MTD mechanisms for cloud have not focused on intruder prevention inside containerized environment. The proposed solution is one of its kind that utilizes resource movement inside and across the virtual private network in the cloud to deceive intruders. The framework continuously changes the target/container to increase confusion about the routing path, so attackers cannot follow the simple attack path. This obscure cloud architecture increases the delay in attack and gives system/network administrators significant time to use Intrusion Detection mechanisms for countering the attack. The proposed scheme is implemented on the Google Cloud Platform (GCP) by using an extensive network of nodes hosting the stateful pods that are created and destroyed periodically. The experimental analysis confirmed that the proposed scheme substantially increased the attack path length and added obscurity at a low computation cost. However, as per experiments, implementing the proposed scheme in GCP slightly increases the dollar cost.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
    Aydeger, Abdullah
    Saputro, Nico
    Akkaya, Kemal
    PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 279 - 285
  • [32] Reducing DDoS Attacks impact using a Hybrid Cloud-Based Firewalling Architecture
    Guenane, Fouad
    Nogueira, Michele
    Pujolle, Guy
    2014 GLOBAL INFORMATION INFRASTRUCTURE AND NETWORKING SYMPOSIUM (GIIS), 2014,
  • [33] SIMULATING LINK AGGREGATION IN PRIVATE VIRTUAL LAN USING OPENFLOW FOR CLOUD ENVIRONMENT
    Murtala, Damilola
    Malik, Yasir
    Zavarsky, Pavol
    COMMUNICATIONS AND NETWORKING SYMPOSIUM (CNS 2018), 2018,
  • [34] Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment
    Iyengar, N. Ch. S. N.
    Ganapathy, Gopinath
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (02) : 119 - 140
  • [35] Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    Wang, Chundong
    JOURNAL OF COMPUTERS, 2012, 7 (10) : 2397 - 2403
  • [36] A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks
    Darwish, Marwan
    Ouda, Abdelkader
    Capretz, Luiz Fernando
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 20 (90-98) : 90 - 98
  • [37] Securing Cloud Environment using a String based Intrusion Detection System
    Raj, R. Sundar
    Bhaskaran, V. Murali
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [38] Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    IFAC PAPERSONLINE, 2016, 49 (22): : 163 - 168
  • [39] The drivers for cloud-based virtual learning environment Examining the moderating effect of school category
    Soon, Hew Teck
    Kadir, Sharifah Latifah Syed A.
    INTERNET RESEARCH, 2017, 27 (04) : 942 - 973
  • [40] Toward Open-source Compilers in a Cloud-based Environment: The Need and Current Challenges
    Ghaleb, Taher Ahmed
    2015 INTERNATIONAL CONFERENCE ON OPEN SOURCE SOFTWARE COMPUTING (OSSCOM), 2015,