Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers

被引:20
作者
Alkadi, Osama [1 ]
Moustafa, Nour [1 ]
Turnbull, Benjamin [1 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
机构
[1] Univ New South Wales ADFA, Sch Engn & Informat Technol, Canberra, ACT 2600, Australia
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
关键词
Cloud computing; virtualization; anomaly detection; virtual migration; data centers; ANOMALY DETECTION; LIVE MIGRATION; NETWORK; IDENTIFICATION; MECHANISM; SYSTEMS; THREATS; ISSUES;
D O I
10.1109/ACCESS.2019.2935142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing paradigm is changing how businesses operate, providing greater efficiency, tolerance, elasticity and flexibility in computing workloads. Underpinning these changes are multiple data centers, operated by different entities and distributed globally. Despite these benefits, cloud computing presents new classes of cyber-attack, opportunities to attack and processes to subvert. One of the primary strategies to defend against cyber-attacks is the migration process. A secure Virtual Machine (VM) migration is essential to safeguard cloud data centers against insider and outsider attacks. In this paper, we propose a collaborative anomaly detection system for discovering insider and outsider attacks from cloud systems and their migration process. The proposed system is named Mixture Localization-based Outliers (MLO) and utilizes Gaussian-mixture models for fitting network data and a local outlier factor function for discovering abnormal patterns in network traffic data. In order to validate the effectiveness of the models, the datasets of UNSW-NB15 and BoT-IoT are employed. The experimental results have revealed the high performance of the proposed system compared with several peer anomaly detection techniques.
引用
收藏
页码:114607 / 114618
页数:12
相关论文
共 40 条
  • [1] Aldhalaan Arwa, 2013, Computer Performance Engineering. 10th European Workshop, EPEW 2013. Proceedings: LNCS 8168, P28, DOI 10.1007/978-3-642-40725-3_4
  • [2] [Anonymous], 2007, P 4 USENIX C NETW SY
  • [3] [Anonymous], 2009, P CLOUD WORKSH
  • [4] [Anonymous], 2017, DATA BREACH INCIDENT
  • [5] Armbrust M., 2009, UCBEECS200928
  • [6] LOF: Identifying density-based local outliers
    Breunig, MM
    Kriegel, HP
    Ng, RT
    Sander, J
    [J]. SIGMOD RECORD, 2000, 29 (02) : 93 - 104
  • [7] Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
    Chen, Henry C. H.
    Lee, Patrick P. C.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 407 - 416
  • [8] Clark C, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 2ND SYMPOSIUM ON NETWORKED SYSTEMS DESIGN & IMPLEMENTATION (NSDI '05), P273
  • [9] Enabling Secure VM-vTPM Migration in Private Clouds
    Danev, Boris
    Masti, Ramya Jayaram
    Karame, Ghassan O.
    Capkun, Srdjan
    [J]. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 187 - 196
  • [10] Designing a Channel Access Mechanism for Wireless Sensor Network
    El-Basioni, Basma M. Mohammad
    Moustafa, Abdellatif I.
    Abd El-Kader, Sherine M.
    Konber, Hussein A.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017, : 1 - 31