Identification of Program Signatures From Cloud Computing System Telemetry Data

被引:0
作者
Nichols, Nicole [1 ]
Greaves, Mark [1 ]
Smith, William [1 ]
LaMothe, Ryan [2 ]
Longoni, Gianluca [2 ]
Teuton, Jeremy [2 ]
机构
[1] Pacific Northwest Natl Lab, 1100 Dexter Ave N,Suite 400, Seattle, WA 98109 USA
[2] Pacific Northwest Natl Lab, 902 Battelle Blvd, Richland, WA 99352 USA
来源
PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI) | 2016年
关键词
INTRUSION DETECTION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious cloud computing activity can take many forms, including running unauthorized programs in a virtual environment. Detection of these malicious activities while preserving the privacy of the user is an important research challenge. Prior work has shown the potential viability of using cloud service billing metrics as a mechanism for proxy identification of malicious programs. Previously this novel detection method has been evaluated in a synthetic and isolated computational environment. In this paper we demonstrate the ability of billing metrics to identify programs, in an active cloud computing environment, including multiple virtual machines running on the same hypervisor. The open source cloud computing platform OpenStack, is used for private cloud management at Pacific Northwest National Laboratory. OpenStack provides a billing tool (Ceilometer) to collect system telemetry measurements. We identify four different programs running on four virtual machines under the same cloud user account. Programs were identified with up to 95% accuracy. This accuracy is dependent on the distinctiveness of telemetry measurements for the specific programs we tested. Future work will examine the scalability of this approach for a larger selection of programs to better understand the uniqueness needed to identify a program. Additionally, future work should address the separation of signatures when multiple programs are running on the same virtual machine.
引用
收藏
页数:5
相关论文
共 24 条
[11]   A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing [J].
Khorshed, Md. Tanzim ;
Ali, A. B. M. Shawkat ;
Wasimi, Saleh A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (06) :833-851
[12]   Is Cloud Computing Really Ready for Prime Time? [J].
Leavitt, Neal .
COMPUTER, 2009, 42 (01) :15-20
[13]  
Marnerides Angelos K., 2015, COMP NETW COMM ICNC
[14]  
Martignoni Lorenzo, 2009, INT C INF SYST SEC
[15]   A survey of intrusion detection techniques in Cloud [J].
Modi, Chirag ;
Patel, Dhiren ;
Borisaniya, Bhavesh ;
Patel, Hiren ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :42-57
[16]   Cloud security technologies [J].
Muttik, Igor ;
Barton, Chris .
Information Security Technical Report, 2009, 14 (01) :1-6
[17]   An intrusion detection and prevention system in cloud computing: A systematic review [J].
Patel, Ahmed ;
Taghavi, Mona ;
Bakhtiyari, Kaveh ;
Celestino Junior, Joaquim .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :25-41
[18]  
Schmidt Matthias, 2011, 2011 19 INT EUR C PA
[19]  
Shabtai A., 2009, INFORM SECURITY TECH, V14, P16, DOI [DOI 10.1016/j.istr.2009.03.003, DOI 10.1016/J.ISTR.2009.03.003]
[20]  
Solanas Marc, 2014, ARXIV14116721