Resilient intrusion detection system for cloud containers

被引:9
|
作者
Abed, Amr S. [1 ]
Azab, Mohamed [2 ]
Clancy, Charles [3 ]
Kashkoush, Mona S. [2 ]
机构
[1] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] City Sci Res & Technol Applicat, Informat Res Inst, Alexandria, Egypt
[3] Virginia Tech, Hume Ctr Natl Secur & Technol, Arlington, VA USA
关键词
cloud security; intrusion detection; behaviour modelling; resilience; Linux container; moving-target defence; MTD; VIRTUAL MACHINE MIGRATION; ATTACKS;
D O I
10.1504/IJCNDS.2020.103857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lightweight virtualisation and isolated execution offered by Linux containers qualify it to be the dominant virtualisation platform for cloud-based applications. The fact that Linux containers run on the same host while sharing the same kernel opens the door for new attacks. However, limited research has been conducted in the area of securing cloud containers. This paper presents a resilient intrusion detection and resolution system for cloud-based containers. The system relies on two main pillars, a real-time smart behaviour monitoring mechanism to detect maliciously behaving containers, and a moving-target defence approach that applies runtime container migration to quarantine such containers and to minimise attack dispersion. To avoid zero-day targeted attacks, the system also induces random live migrations between running containers to obfuscate its execution behaviour. Such obfuscation makes it harder for attackers to execute their targeted attacks. The system was tested by a big-data application using a container-based Apache Hadoop cluster to demonstrate the system's ability to automatically deploy, monitor, detect, and respond to maliciously behaving applications by live migration or by rolling back the container to a safe state. Results showed that the proposed system efficiently ensure safe and secure container operation.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 50 条
  • [1] Intrusion Detection System for Applications Using Linux Containers
    Abed, Amr S.
    Clancy, Charles
    Levy, David S.
    SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 123 - 135
  • [2] An Explainable and Resilient Intrusion Detection System for Industry 5.0
    Javeed, Danish
    Gao, Tianhan
    Kumar, Prabhat
    Jolfaei, Alireza
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 1342 - 1350
  • [3] An Efficient Cloud Network Intrusion Detection System
    Ghosh, Partha
    Mandal, Abhay Kumar
    Kumar, Rupesh
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 91 - 99
  • [4] Cloud Intrusion Detection System Based on SVM
    Alheeti K.M.A.
    Lateef A.A.A.
    Alzahrani A.
    Imran A.
    Al Dosary D.
    International Journal of Interactive Mobile Technologies, 2023, 17 (11) : 101 - 114
  • [5] Framework for Cloud Intrusion Detection System Service
    Aljurayban, Nouf Saleh
    Emam, Ahmed
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [6] A Cloud Based Network Intrusion Detection System
    You, Li
    Wang, Zhanyong
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (03): : 987 - 992
  • [7] Intrusion Detection in the Cloud
    Roschke, Sebastian
    Cheng, Feng
    Meinel, Christoph
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 729 - 734
  • [8] Cloud computing for network security intrusion detection system
    Yang, J. (jinnyang@163.com), 1600, Academy Publisher (08):
  • [9] Hypervisor-based Cloud Intrusion Detection System
    Nikolai, Jason
    Wang, Yong
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 989 - 993
  • [10] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104