Quantify Co-Residency Risks in the Cloud Through Deep Learning

被引:9
作者
Han, Jin [1 ]
Zang, Wanyu [2 ]
Yu, Meng [2 ]
Sandhu, Ravi [3 ,4 ]
机构
[1] Samsung Res, Austin, TX 78746 USA
[2] Roosevelt Univ 2460, Dept Comp Sci, Chicago, IL 60605 USA
[3] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[4] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
关键词
Cloud computing; Security; Virtual machining; Measurement; Data mining; Deep learning; Computational modeling; Cloud security; deep learning; co-resident attack; MODEL;
D O I
10.1109/TDSC.2020.3032073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, while becoming more and more popular as a dominant computing platform, introduces new security challenges. When virtual machines are deployed in a cloud environment, virtual machine placement strategies can significantly affect the overall security risks of the entire cloud. In recent years, the attacks are specifically designed to co-locate with target virtual machines in the cloud. The virtual machine placement without considering the security risks may put the users, or even the entire cloud, in danger. In this article, we present a fine-grained model to quantify the risk level caused by co-residency. Using a large scale dataset collected from Microsoft Azure Platform, we profile the behavior patterns of normal service subscribers (tenants) using our proposed feature metrics. Tenants are clustered into multiple categories. After the baseline is established based on the normal behavior pattern, the derivation can be evaluated for each category and the high-risk group can be labeled accordingly. With the labeled datasets, a classification component and a quantification component are constructed to dynamically quantify the co-residency risks for a specific virtual machine. Our experimental results demonstrate the robustness of our model to the new data and the accuracy is verified by examination of F-score Matrix.
引用
收藏
页码:1568 / 1579
页数:12
相关论文
共 46 条
[1]   Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) [J].
Alhebaishi, Nawaf ;
Wang, Lingyu ;
Jajodia, Sushil .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 :3-23
[2]  
Amvrosiadis G, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P533
[3]  
[Anonymous], INT C LEARNING REPRE
[4]   Determinating Timing Channels in Compute Clouds [J].
Aviram, Amittai ;
Hu, Sen ;
Ford, Bryan ;
Gummadi, Ramakrishna .
PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, :103-108
[5]  
Barham P., 2003, Operating Systems Review, V37, P164, DOI 10.1145/1165389.945462
[6]  
Bergstra J, 2012, J MACH LEARN RES, V13, P281
[7]  
Bijon Khalid., 2015, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, P183, DOI DOI 10.1145/2699026.2699112
[8]  
Bijon Khalid., 2015, 20th Symposium on Access Control Models and Technologies, P63, DOI DOI 10.1145/2752952.2752964
[9]  
Bijon KZ, 2014, LECT NOTES COMPUT SC, V8792, P41, DOI 10.1007/978-3-319-11698-3_4
[10]  
Boyle Tara., Dealing with imbalanced data