Resilient intrusion detection system for cloud containers

被引:9
|
作者
Abed, Amr S. [1 ]
Azab, Mohamed [2 ]
Clancy, Charles [3 ]
Kashkoush, Mona S. [2 ]
机构
[1] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] City Sci Res & Technol Applicat, Informat Res Inst, Alexandria, Egypt
[3] Virginia Tech, Hume Ctr Natl Secur & Technol, Arlington, VA USA
关键词
cloud security; intrusion detection; behaviour modelling; resilience; Linux container; moving-target defence; MTD; VIRTUAL MACHINE MIGRATION; ATTACKS;
D O I
10.1504/IJCNDS.2020.103857
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lightweight virtualisation and isolated execution offered by Linux containers qualify it to be the dominant virtualisation platform for cloud-based applications. The fact that Linux containers run on the same host while sharing the same kernel opens the door for new attacks. However, limited research has been conducted in the area of securing cloud containers. This paper presents a resilient intrusion detection and resolution system for cloud-based containers. The system relies on two main pillars, a real-time smart behaviour monitoring mechanism to detect maliciously behaving containers, and a moving-target defence approach that applies runtime container migration to quarantine such containers and to minimise attack dispersion. To avoid zero-day targeted attacks, the system also induces random live migrations between running containers to obfuscate its execution behaviour. Such obfuscation makes it harder for attackers to execute their targeted attacks. The system was tested by a big-data application using a container-based Apache Hadoop cluster to demonstrate the system's ability to automatically deploy, monitor, detect, and respond to maliciously behaving applications by live migration or by rolling back the container to a safe state. Results showed that the proposed system efficiently ensure safe and secure container operation.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 50 条
  • [41] Multi-tenant intrusion detection system for public cloud (MTIDS)
    Mohamed Hawedi
    Chamseddine Talhi
    Hanifa Boucheneb
    The Journal of Supercomputing, 2018, 74 : 5199 - 5230
  • [42] HIDS: A host based intrusion detection system for cloud computing environment
    Deshpande P.
    Sharma S.C.
    Peddoju S.K.
    Junaid S.
    Deshpande, Prachi (deprachi3@gmail.com), 2018, Springer (09) : 567 - 576
  • [43] Intrusion Detection System (IDS) Server Placement Analysis in Cloud Computing
    Aryachandra, A. A.
    Arif, Fazmah Y.
    Anggis, Novian S.
    2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2016,
  • [44] Deployment of Intrusion Detection System in Cloud: A Performance-based Study
    Mahajan, Varun
    Peddoju, Sateesh K.
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1103 - 1108
  • [45] AsIDPS: Auto-Scaling Intrusion Detection and Prevention System for Cloud
    Xing, Junchi
    Zhou, Haifeng
    Shen, Jinfan
    Zhu, Kai
    Wang, Yansong
    Wu, Chunming
    Ruan, Wei
    2018 25TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2018, : 207 - 212
  • [46] Intelligent machine learning approach for cids—cloud intrusion detection system
    Sowmya, T.
    Muneeswari, G.
    Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 873 - 885
  • [47] An Efficient Fuzzy-Based Hybrid System to Cloud Intrusion Detection
    Raja, Sivakami
    Ramaiah, Saravanan
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2017, 19 (01) : 62 - 77
  • [48] An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms
    Almomani, Ammar
    Alauthman, Mohammad
    Albalas, Firas
    Dorgham, O.
    Obeidat, Atef
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (02) : 96 - 112
  • [49] Securing Cloud Environment using a String based Intrusion Detection System
    Raj, R. Sundar
    Bhaskaran, V. Murali
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [50] A Survey on Various Intrusion Detection System Tools and Methods in Cloud Computing
    Akshaya, Swathy M.
    Padmavathi, G.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 439 - 445