I know you are watching me

Insider attacks in which misbehaving Virtual Machines (VMs) take part of the cloud system and learn about its internal vulnerabilities constitute a major threat against cloud resources and infrastructure. This demands setting up continuous and comprehensive security arrangements to restrict the effe...

Full description

Saved in:
Bibliographic Details
Main Author: Abdel Wahab, Omar (author)
Other Authors: Bentahar, Jamal (author), Otrok, Hadi (author), Mourad, Azzam (author)
Format: conferenceObject
Published: 2017
Online Access:http://hdl.handle.net/10725/8322
http://dx.doi.org/10.1109/ICWS.2017.88
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://www.computer.org/csdl/proceedings/icws/2017/0752/00/0752a728-abs.html
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Insider attacks in which misbehaving Virtual Machines (VMs) take part of the cloud system and learn about its internal vulnerabilities constitute a major threat against cloud resources and infrastructure. This demands setting up continuous and comprehensive security arrangements to restrict the effects of such attacks. However, limited security resources prohibit full detection coverage on all VMs at all times, which can be exploited by attackers to examine the selective detection strategies and adjust their own attack plans accordingly. Motivated by the absence of any approach that accounts for such a challenge in the domain of cloud computing, we propose in this work an adaptive detection strategy that formulates a Stackelberg security game to enable the cloud system to optimally exploit its available amount of security resources to maximize the detection of distributed attacks, knowing that attackers have the ability to monitor the cloud system's strategies and adjust their own attack plans. Experiments carried out on the CloudSim framework reveal that the proposed solution maximizes the detection of distributed attacks and minimizes false negatives and positives compared to a maximin-based detection strategy, while being scalable to the increase in both the number of co-hosted VMs and percentage of co-resident attackers.