Identification of Program Signatures From Cloud Computing System Telemetry Data

被引:0
作者
Nichols, Nicole [1 ]
Greaves, Mark [1 ]
Smith, William [1 ]
LaMothe, Ryan [2 ]
Longoni, Gianluca [2 ]
Teuton, Jeremy [2 ]
机构
[1] Pacific Northwest Natl Lab, 1100 Dexter Ave N,Suite 400, Seattle, WA 98109 USA
[2] Pacific Northwest Natl Lab, 902 Battelle Blvd, Richland, WA 99352 USA
来源
PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI) | 2016年
关键词
INTRUSION DETECTION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious cloud computing activity can take many forms, including running unauthorized programs in a virtual environment. Detection of these malicious activities while preserving the privacy of the user is an important research challenge. Prior work has shown the potential viability of using cloud service billing metrics as a mechanism for proxy identification of malicious programs. Previously this novel detection method has been evaluated in a synthetic and isolated computational environment. In this paper we demonstrate the ability of billing metrics to identify programs, in an active cloud computing environment, including multiple virtual machines running on the same hypervisor. The open source cloud computing platform OpenStack, is used for private cloud management at Pacific Northwest National Laboratory. OpenStack provides a billing tool (Ceilometer) to collect system telemetry measurements. We identify four different programs running on four virtual machines under the same cloud user account. Programs were identified with up to 95% accuracy. This accuracy is dependent on the distinctiveness of telemetry measurements for the specific programs we tested. Future work will examine the scalability of this approach for a larger selection of programs to better understand the uniqueness needed to identify a program. Additionally, future work should address the separation of signatures when multiple programs are running on the same virtual machine.
引用
收藏
页数:5
相关论文
共 24 条
[1]  
Alliance Cloud Security, 2010, TOP THREATS CLOUD CO
[2]  
[Anonymous], 2009, ACM CCSW
[3]  
[Anonymous], 2010, INFOCOM 2010 P IEEE
[4]  
[Anonymous], USENIX SEC S
[5]  
Balboni P., 2009, TECH REP
[6]   SmcHD1, containing a structural-maintenance-of-chromosomes hinge domain, has a critical role in X inactivation [J].
Blewitt, Marnie E. ;
Gendrel, Anne-Valerie ;
Pang, Zhenyi ;
Sparrow, Duncan B. ;
Whitelaw, Nadia ;
Craig, Jeffrey M. ;
Apedaile, Anwyn ;
Hilton, Douglas J. ;
Dunwoodie, Sally L. ;
Brockdorff, Neil ;
Kay, Graham F. ;
Whitelaw, Emma .
NATURE GENETICS, 2008, 40 (05) :663-669
[7]   Simulating Metabolism with Statistical Thermodynamics [J].
Cannon, William R. .
PLOS ONE, 2014, 9 (08)
[8]   Feature representation and selection in malicious code detection methods based on static system calls [J].
Ding Yuxin ;
Yuan Xuebing ;
Zhou Di ;
Dong Li ;
An Zhanchao .
COMPUTERS & SECURITY, 2011, 30 (6-7) :514-524
[9]  
Garfinkel T., A virtual machine introspection based architecture for intrusion detection
[10]   Cloud Computing Roundtable [J].
Grosse, Eric ;
Howie, John ;
Ransome, James ;
Reavis, Jim ;
Schmidt, Steve .
IEEE SECURITY & PRIVACY, 2010, 8 (06) :17-23