首页> 外文期刊>Journal of supercomputing >A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment
【24h】

A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment

机译:云环境下基于虚拟机管理程序攻击的基于博弈论的分布式检测方法

获取原文
获取原文并翻译 | 示例
       

摘要

Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment perspective, cloud is like electricity and water as people who use more of this shared pool should pay larger fees. Cloud computing involves a diverse set of technologies including networking, virtualization and transaction scheduling. Thus, it is vulnerable to a wide range of security threats. Some of the most important security issues threatening the cloud computing systems originate from virtualization technology, as it constitutes the main body and basis of these systems. The most important virtualization-based security threats include VM side channel, VM escape and rootkit attacks. The previous works on the subject of virtualization security rely on hardware approaches such as the use of firewalls, which are expensive, the use of schedulers to control the side channels along with noise injection, which impose high overhead, or the use of agents to collect information and send them back to a central intrusion detection system, which itself can become the target of attacker. In the method presented in this paper, a group of mobile agents act as the sensors of invalid actions in the cloud environment. They start a noncooperative game with the suspected attacker and then calculate the Nash equilibrium value and utility so as to differentiate an attack from legitimate requests and determine the severity of attack and its point of origin. The simulation results show that this method can detect the attacks with 86% accuracy. The use of mobile agents and their trainability feature has led to reduced system overhead and accelerated detection process.
机译:云计算是可伸缩虚拟资源的池,为大量用户提供服务,这些用户根据所使用服务的程度付费。从支付角度来看,云就像电力和水一样,使用更多共享池的人应该支付更高的费用。云计算涉及多种技术,包括网络,虚拟化和事务调度。因此,它容易受到各种各样的安全威胁。威胁云计算系统的一些最重要的安全问题源自虚拟化技术,因为虚拟化技术构成了这些系统的主体和基础。基于虚拟化的最重要的安全威胁包括VM侧通道,VM逃逸和Rootkit攻击。以前有关虚拟化安全性的工作依赖于硬件方法,例如使用昂贵的防火墙,使用调度程序控制边信道以及噪声注入(这会增加高开销)或使用代理进行收集信息并将其发送回中央入侵检测系统,该系统本身可能成为攻击者的目标。在本文提出的方法中,一组移动代理充当云环境中无效动作的传感器。他们与可疑的攻击者开始非合作游戏,然后计算Nash平衡值和效用,以便区分攻击与合法请求,并确定攻击的严重性及其起源。仿真结果表明,该方法能够以86%的准确率检测到攻击。移动代理及其可训练性功能的使用导致减少了系统开销并加快了检测过程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号