Resilient intrusion detection system for cloud containers

被引:9
作者
Abed, Amr S. [1 ]
Azab, Mohamed [2 ]
Clancy, Charles [3 ]
Kashkoush, Mona S. [2 ]
机构
[1] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] City Sci Res & Technol Applicat, Informat Res Inst, Alexandria, Egypt
[3] Virginia Tech, Hume Ctr Natl Secur & Technol, Arlington, VA USA
关键词
cloud security; intrusion detection; behaviour modelling; resilience; Linux container; moving-target defence; MTD; VIRTUAL MACHINE MIGRATION; ATTACKS;
D O I
10.1504/IJCNDS.2020.103857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lightweight virtualisation and isolated execution offered by Linux containers qualify it to be the dominant virtualisation platform for cloud-based applications. The fact that Linux containers run on the same host while sharing the same kernel opens the door for new attacks. However, limited research has been conducted in the area of securing cloud containers. This paper presents a resilient intrusion detection and resolution system for cloud-based containers. The system relies on two main pillars, a real-time smart behaviour monitoring mechanism to detect maliciously behaving containers, and a moving-target defence approach that applies runtime container migration to quarantine such containers and to minimise attack dispersion. To avoid zero-day targeted attacks, the system also induces random live migrations between running containers to obfuscate its execution behaviour. Such obfuscation makes it harder for attackers to execute their targeted attacks. The system was tested by a big-data application using a container-based Apache Hadoop cluster to demonstrate the system's ability to automatically deploy, monitor, detect, and respond to maliciously behaving applications by live migration or by rolling back the container to a safe state. Results showed that the proposed system efficiently ensure safe and secure container operation.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 31 条
  • [1] Abed A.S., 2015, SEC TRUST MAN 11 INT, DOI [10.1007/978-3-319-24858-5{\_} 8, DOI 10.1007/978-3-319-24858-5]
  • [2] Abed AS, 2015, IEEE GLOBE WORK
  • [3] Alariti SS, 2012, INT CONF INTERNET, P211
  • [4] Virtual CPU Validation
    Amit, Nadav
    Tsafrir, Dan
    Schuster, Assaf
    Ayoub, Ahmad
    Shlomo, Iran
    [J]. SOSP'15: PROCEEDINGS OF THE TWENTY-FIFTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2015, : 311 - 327
  • [5] [Anonymous], 1996, IEEE Symposium on Security and Privacy, DOI DOI 10.1109/SECPRI.1996.502675
  • [6] Azab M., 2016, INT S SEC PRIV WORKS
  • [7] MIGRATE: Towards a Lightweight Moving-target Defense against Cloud Side-Channels
    Azab, Mohamed
    Eltoweissy, Mohamed
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 96 - 103
  • [8] ChameleonSoft: Software Behavior Encryption for Moving Target Defense
    Azab, Mohamed
    Eltoweissy, Mohamed
    [J]. MOBILE NETWORKS & APPLICATIONS, 2013, 18 (02) : 271 - 292
  • [9] Secure yet usable: Protecting servers and Linux containers
    Barlev, S.
    Basil, Z.
    Kohanim, S.
    Peleg, R.
    Regev, S.
    Shulman-Peleg, A.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2016, 60 (04)
  • [10] Bouché J, 2015, 2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), P175, DOI 10.1109/ITechA.2015.7317391