Resilient intrusion detection system for cloud containers

被引:9
|
作者
Abed, Amr S. [1 ]
Azab, Mohamed [2 ]
Clancy, Charles [3 ]
Kashkoush, Mona S. [2 ]
机构
[1] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] City Sci Res & Technol Applicat, Informat Res Inst, Alexandria, Egypt
[3] Virginia Tech, Hume Ctr Natl Secur & Technol, Arlington, VA USA
关键词
cloud security; intrusion detection; behaviour modelling; resilience; Linux container; moving-target defence; MTD; VIRTUAL MACHINE MIGRATION; ATTACKS;
D O I
10.1504/IJCNDS.2020.103857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lightweight virtualisation and isolated execution offered by Linux containers qualify it to be the dominant virtualisation platform for cloud-based applications. The fact that Linux containers run on the same host while sharing the same kernel opens the door for new attacks. However, limited research has been conducted in the area of securing cloud containers. This paper presents a resilient intrusion detection and resolution system for cloud-based containers. The system relies on two main pillars, a real-time smart behaviour monitoring mechanism to detect maliciously behaving containers, and a moving-target defence approach that applies runtime container migration to quarantine such containers and to minimise attack dispersion. To avoid zero-day targeted attacks, the system also induces random live migrations between running containers to obfuscate its execution behaviour. Such obfuscation makes it harder for attackers to execute their targeted attacks. The system was tested by a big-data application using a container-based Apache Hadoop cluster to demonstrate the system's ability to automatically deploy, monitor, detect, and respond to maliciously behaving applications by live migration or by rolling back the container to a safe state. Results showed that the proposed system efficiently ensure safe and secure container operation.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 50 条
  • [31] An intrusion detection and prevention system in cloud computing: A systematic review
    Patel, Ahmed
    Taghavi, Mona
    Bakhtiyari, Kaveh
    Celestino Junior, Joaquim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 25 - 41
  • [32] Study of Intrusion Detection System for DDoS Attacks in Cloud Computing
    Kumar, Naresh
    Sharma, Shalini
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [33] A differential game model of intrusion detection system in cloud computing
    Li, Zhi
    Xu, Haitao
    Liu, Yanzhu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (01):
  • [34] A Cloud-Based Intrusion Detection System for Android Smartphones
    Khune, Rohit S.
    Thangakumar, J.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 180 - 184
  • [35] Intrusion Detection System with Snort in Cloud Computing: Advanced IDS
    Mishra, Vikas
    Vijay, Vinay Kumar
    Tazi, Satyanaryan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 457 - 465
  • [36] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283
  • [37] A sequential deep learning framework for a robust and resilient network intrusion detection system
    Hore, Soumyadeep
    Ghadermazi, Jalal
    Shah, Ankit
    Bastian, Nathaniel D.
    COMPUTERS & SECURITY, 2024, 144
  • [38] An Architecture for Resilient Intrusion Detection in IoT Networks
    Al Qurashi, Mohammed
    Angelopoulos, Constantinos Marios
    Katos, Vasilios
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [39] Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure
    Sethi, Kamalakanta
    Kumar, Rahul
    Prajapati, Nishant
    Bera, Padmalochan
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [40] Design of the Network Security Intrusion Detection System Based on the Cloud Computing
    Di, Meng
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 68 - 73