Anomaly Detection with Virtual Service Migration in Cloud Infrastructures
نویسنده
چکیده
Cloud computing is becoming a very popular way to outsource data storage, services or even infrastructure. Clouds are large network data centers that make use of virtualization technology, thus enabling dynamic scalability and , from user’s perspective, apparent infinite resources. Clouds host services in virtual machines that are isolated from one another and can be migrated within or between data centers. Virtual service migration is used in case of failure or disaster, resource optimization issues, maintenance and to reduce network costs. This thesis work shows how virtual service migration affects state-of-the-art anomaly detection that can be used to detect malicious activity, such as Distributed Denial of Service attacks. Using data from actual services, anomalous traffic is analyzed with and without migration in different scenarios. The scenarios cover different types of anomalies, i.e. attacks, variations of anomaly intensity and variations of size of migrated services. All these parameters affect how much virtual service migration influences anomaly detection results. Our results show that, in some cases, virtual service migration can be incorrectly detected as an anomaly, i.e., an attack. To mitigate this, one could adjust detection parameters such as the anomaly score threshold to reduce the number of incorrectly detected attacks. However, this introduced the risk of not detecting genuine attacks. This finding brings into question the reliability of state-of-the-art anomaly detection techniques when applied in the cloud, pointing to the need for further investigation in this important area.
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملA Lightweight Tool for Anomaly Detection in Cloud Data Centres
Cloud data centres are critical business infrastructures and the fastest growing service providers. Detecting anomalies in Cloud data centre operation is vital. Given the vast complexity of the data centre system software stack, applications and workloads, anomaly detection is a challenging endeavour. Current tools for detecting anomalies often use machine learning techniques, application insta...
متن کاملReflections on the Self-service Cloud Computing Project
Modern cloud computing infrastructures use virtual machine monitors (VMMs) that often include a large and complex administrative domain with privileges to inspect client VM state. Attacks against or misuse of the administrative domain can compromise client security and privacy. Moreover, these VMMs provide clients inflexible control over their own VMs, as a result of which clients have to rely ...
متن کاملA Virtual Machine Instance Anomaly Detection System for IaaS Cloud Computing
Infrastructure as a Service (IaaS) is one of the three important fundamental service models provided by cloud computing. It provides users with computing resource and storage resource in terms of virtual machine instances. Because of the rapid development of cloud computing, more and more application systems have been deployed on the IaaS cloud computing platforms. Therefore, once anomalies inc...
متن کاملSurvey on Service Migration to Cloud Architecture
This paper contributes to the growing knowledge of how to migrate existing systems to cloud computing environment. An increasing number of companies are expected to migrate their systems to cloud enabled infrastructures. Since migration is likely to encounter several kinds of challenges, it is important to identify and share the process and requirements of migration projects in order to build a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013