首页> 外文OA文献 >Attacks on Cloud Environments and their Mitigation: Host-based Isolated and Coordinated Attacks
【2h】

Attacks on Cloud Environments and their Mitigation: Host-based Isolated and Coordinated Attacks

机译:对云环境及其缓解的攻击:基于主机的隔离和协调攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The main goal of this research is to improve the security of large-scale public IaaS (Infrastructure-as-a-Service) cloud computing environments on the provider side. We aim to help providers to be more aware of the cloud’s overall security and to have a sense of control in areas where they actually have no control at all (i.e. the activities inside the hosted Virtual Machines, or VMs).In an IaaS model, computing infrastructure is delivered as a service. Consumers can deploy and run their VMs in the cloud infrastructure that acts as a hosting environment and offers virtual resources to VMs to consume. Each VM is under the full control of its owner (the client) and contains operating systems, applications, and services.The hosted VMs are managed off-premises by the clients’ IT teams, which could be security naive, have malicious intentions, or just carelessly ignore security policies and good practices. Insecure VMs hosted in the public cloud share the service with other VMs that belong to different organisations which represent a major security threat.Providers are trying to manage this threat through contracts and legal obligations. However, finding the source of the threat is a hard task if there are no security monitoring tools. Even though providers have no control over what is happening inside VMs, they are still responsible for protecting the hosted VMs, the infrastructure, keeping VMs from attacking each other, preventing attacks originating from their network, and most importantly being able to find the source of the threat. Therefore, detection systems are needed to monitor each of the hosted VMs without invading their privacy and with the minimum performance overhead.Providers have to monitor VMs and detect any abnormal activities without requiring any instrumentation inside the VMs. Most of the cloud monitoring tools available today are designed for performance monitoring, not security purposes.For this research, we developed two detection systems that are able to monitor VMs without any level of intrusiveness; we argue that this level of granularity is sufficient for capturing a number of relevant attack classes. The developed systems were able to detect abnormal activities within VMs and generate strong anomaly signals. The first detection system is based on a very low-demanding statistical method called bag of system calls (BoSC); the second system is based on a more computationally expensive machine learning method called hidden Markov model (HMM). The second system is designed specifically to monitor ephemeral VMs (VMs with a short life) because it requires less training data and less time to be ready.In this research we also studied different cloud attacks and developed a cloud specific Denial of Service (DoS) class of attacks that work by misusing two of the main features of the cloud: over-commitment and migration. We call this newly developed class of attacks ”Cloud-Internal Denial of Service” attacks, or CIDoS. This attack targets the architecture of the cloud, not the implementation, which makes it harder to defeat. Then we suggested some detection and prevention mechanisms. After that, we developed another attack that instrumented a CIDoS attack with reverse engineered migration algorithms in the cloud to extract parameters that help improve the DoS attack and make it harder to detect and defeat.
机译:这项研究的主要目的是在提供商方面提高大型公共IaaS(基础设施即服务)云计算环境的安全性。我们旨在帮助提供商更加了解云的整体安全性,并在他们根本无法控制的区域(即托管虚拟机或VM中的活动)具有控制感。在IaaS模型中,计算基础架构作为服务交付。消费者可以在充当托管环境并向VM提供虚拟资源以供使用的云基础架构中部署和运行其VM。每个VM都在其所有者(客户端)的完全控制下,并包含操作系统,应用程序和服务。托管的VM由客户端的IT团队进行非本地管理,这可能是幼稚的安全性,恶意目的或只是不小心忽略了安全策略和良好做法。托管在公共云中的不安全的VM与属于不同组织的其他VM共享服务,这些VM代表了主要的安全威胁。提供商试图通过合同和法律义务来管理这种威胁。但是,如果没有安全监视工具,则要找到威胁的来源是一项艰巨的任务。即使提供商无法控制虚拟机内部发生的情况,他们仍然负责保护托管的虚拟机,基础架构,防止虚拟机相互攻击,防止源自其网络的攻击,最重要的是能够找到虚拟机的来源威胁。因此,需要一种检测系统来监控每个托管的VM,同时又不损害其隐私并以最低的性能开销实现服务提供商的服务。提供商必须监控VM并检测任何异常活动,而无需在VM内部进行任何检测。当今可用的大多数云监视工具都是为性能监视而设计的,而不是出于安全性目的。针对此研究,我们开发了两个检测系统,它们能够监视VM,而不会造成任何干扰。我们认为,这种粒度级别足以捕获许多相关的攻击类别。开发的系统能够检测虚拟机内的异常活动并生成强烈的异常信号。第一个检测系统基于一种需求量极低的统计方法,称为系统调用包(BoSC)。第二个系统基于一种计算量更大的机器学习方法,称为隐马尔可夫模型(HMM)。第二个系统专门用于监视短暂的VM(寿命短的VM),因为它需要较少的训练数据和较少的准备时间。在本研究中,我们还研究了不同的云攻击并开发了特定于云的拒绝服务(DoS)通过滥用云的两个主要功能而起作用的一类攻击:过度使用和迁移。我们将这种新开发的攻击类别称为“云内部拒绝服务”攻击或CIDoS。这种攻击针对的是云的体系结构,而不是目标实现,这使得更难被击败。然后,我们提出了一些检测和预防机制。此后,我们开发了另一种攻击,该工具利用云中的反向工程迁移算法对CIDoS攻击进行了检测,以提取有助于改善DoS攻击并使其更难检测和击败的参数。

著录项

  • 作者

    Alarifi Suaad;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号