(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 9 Issue: 2, 2012

A Novel Strategy Variance Based Intrusion Detection and Log Management in Cloud Computing Chaitanya Thota #1, Lavanya Thota#2, Preethi M*3 #

Computer Science Engineering Department Vaagdevi College of Engineering, Warangal, AP, INDIA * Assistant Professor, Dept. of CSE Kakatiya Institute Of Technology & Sciences, Warangal , AP, INDIA Abstract— Cloud computing is clearly one of today’s most enticing technology areas due, at least in part, to its costefficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about security of cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we propose Variance based Intrusion Detection Systems (IDSs) and log management method based on consumer behavior for applying IDS effectively to Cloud Computing system. IDSs are one of the most popular devices for protecting Cloud Computing systems from various types of attack. Because an IDS observes the traffic from each VM and generates alert logs, it can manage Cloud Computing globally. In this case, there exists a tradeoff between the security level of the IDS and the system performance. If the IDS provide greater security service using more rules or patterns, which cause apparent slowdown in network functionality in proportion to the strength of security. So the amount of resources allocating for customers decreases. One more problem in Cloud Computing is that, vast amount of logs makes system administrators hard to examine them. Proposed method enables Cloud Computing system to accomplish both efficacy of using the system resource and strength of the security service without tradeoff between them. Keywords— IDS, Cloud Computing, Intrusion Detection, Variance based IDS, Cooperative IDS

I. INTRODUCTION Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing physical hardware. Cloud computing providers deliver applications via the internet, which are accessed from web browsers and desktop and mobile apps, while the business software and data are stored on servers at a remote location. In some cases, legacy applications (line of business applications that until now have been prevalent in thin client Windows computing) are delivered via a screensharing technology, while the computing resources are consolidated at a remote data center location; in other cases, entire business applications have been coded using webbased technologies. For this reason, Cloud Computing has been rapidly developed along with the trend of IT services. Cloud Computing can be defined as internet-based computing, whereby shared resources, software, and information are provided to computers and other devices. It is efficient and cost economical for consumers to use computing resources as much as they need or use services they want from Cloud Computing provider. Especially, Cloud Computing has been

recently more spotlighted than other computing services because of its capacity of providing unlimited amount of resources. Moreover, consumers can use the services wherever Internet access is possible, so Cloud Computing is excellent in the aspect of accessibility. Cloud Computing systems have a lot of resources and private information, therefore they are easily threatened by intruders especially System administrators.

Fig. 1 Cloud Computing

IDS is an effective technique to protect Cloud Computing systems. Misused-based intrusion detection is used to detect Web-based attacks. It went deeply into Detection & observes the traffic from each VM and generates alert logs and the speed of detection process has been significantly improved. Another important problem is log management. Cloud Computing systems are used by many people, therefore, they generate huge amount of logs. So, system administrators should decide to which log should be analyzed first. A. Paper Organization In this paper, we propose Variance based IDS and log management method based on consumer behavior for applying IDS effectively to Cloud Computing system. The rest of the paper is organized as follows. In Chapter II we describe related works which are Cloud Computing and IDS. After that, we describe our proposal method in chapter III. In Chapter IV, we evaluate our method. Finally, we conclude the paper in chapter in Chapter V.

II. RESEARCH BACKGROUND Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity.

©IJEECS

(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 9 Issue: 2, 2012 However there are still some concerns about the security provided by the cloud environment are raises. A. Cloud Computing Cloud Computing is a service that assigns virtualized resources picked from a large-scale resource pool, which consists of distributed computing resources in a Cloud Computing infra, to each consumer. Cloud Computing is a fused-type computing paradigm which includes Virtualization, Grid Computing, Utility Computing, Server Based Computing(SBC), and Network Computing, rather than a entirely new type of computing technique [3][4]. Table I shows the description of each computing technique. Cloud Computing provider can assign large-scale resources to each consumer using these techniques. Cloud Computing uses hypervisor in order to provide virtual OS for users by using unified resource. Hypervisor is a software which enables several OSs to be executed in a host computer at the same time. Hypervisor also can map the virtualized, logical resource onto physical resource. Hypervisor is sometimes called Virtual Machine Monitor(VMM), and several OSs which are operated in a host computer are called guest OSs. A hypervisor provides isolated virtual hardware platform for operating guest OSs. Therefore, guest OSs are operated in each VM environment instead of real hardware. A host OS which provides the image of original OS to guest OS, can assign various type of OS other than the type OS of host itself. Figure 2 conceptually describes the organization of hypervisor, host OS, and guest OS.

Fig. 2 Hypervisor structure

As figure 2, resource, instruction, and traffic of guest OSs in a hypervisor are mapped to a physical hardware through host OS. Cloud Computing is a set which consists large amount and various types of computing resource, hypervisor, and data. Therefore Cloud Computing providers should own database centers to maintain their resources and data. Cloud Computing service is very attractive to consumers in the aspects of infinite scalability and payment cost in accordance with the amount of computing resource they used, however there also exists the risk that personal and private data are stored in uncontrolled place themselves[5]. So Cloud

Computing providers must protect their Cloud Computing system against all users include administrators and intruders [6]. TABLE I USER RISK LEVELS

Technology Virtualization

Grid Computing

Definition The creation of a virtual version of something, such as an operating system, a server, a storage device or network resources. The virtualized combination of computing power from multiple domain getting high capacity of computing resource (distributed computing architecture).

Utility Computing

Consumers pay for computing resources as much as they use without buying them.

Server Based Computing (SBC)

Any applications and data exist in server. Clients access the server and utilize them using server's computing power.

Network Computing

It is similar to SBC, but client loads applications and data from server and utilizes them using local computing power.

B. Intrusion Detection Systems (IDS) IDSs are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems [7]. IDSs are one of widely used security technologies. An IDS alerts to system administrators, generate log about attack when it detects signature of accident according to host or network security policy. An IDS can be installed in a host or a network according to purpose. An IDS detects attacks based on lots of rules each of which have unique signatures that describes attack patterns. So, the detection power of IDS increases when the number of rule grows. However the existence of more rules means that each incoming packet needs to be compared with more patterns. Thus large scale of rule causes system to become overloaded. In the Cloud Computing service, it is necessary to allocate resources to users as much as possible. So it is important issue to manage resources for reducing consumption of resources caused by implementing IDS. Some considerations when deploying IDS for protecting each individual VM in Cloud Computing system are as follows. First, the security problems bring much more economic loss in Cloud Computing than in the other kind of systems. Second, in Cloud Computing systems, it is difficult to analyze logs because communication between many system and many consumers generate large amount of logs. Finally, Cloud Computing services are to provide their resource to consumers, therefore effective resource management is greatly desirable. In this paper, we propose the method for maintaining strength of security while minimizing waste of resources and analyzing logs efficiently. III. VARIANCE BASED IDS AND LOG MANAGEMENT METHOD We propose the Variance based IDS method for implementing effective IDS in Cloud Computing system. Variance based IDS method leads to effective resource usage

©IJEECS

(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 9 Issue: 2, 2012 by applying differentiated level of security strength to users based on the degree of Variance. It is true that Cloud Computing is easy to be target of attack [9]. For this reason, it is possible to judge all users and administrators as potential attacker and apply strong security policy to all traffic, but it is not efficient at all. So we propose the method that binds users to different security group in accordance with degree of Variance, called Variance level in this paper. Our proposal architecture is as shown in Figure 3. AAA is a management module for authentication, authorization, and accounting. When a user tries to access Cloud Computing system, then AAA checks the user's authentication information. If the user is authenticated, then AAA gets the user's Variance level, which has been most recently generated, by inspecting the user's information in the database. After that, AAA chooses suitable IDS which have the security level correspondent to the user's Variance level. Then AAA requests the host OS, in which the chosen IDS is installed, to assign guest OS image for the user. Database stores and manages user information, system log, transaction of user and system. System managers can quickly cope with the non-predictable situation in Cloud Computing system through the assistance of the database that periodically intercommunicates with AAA and host OS. Storage center stores private data of users. All users' data is logically isolated, so nobody can access the data except owners of the data and users who have been given access right by owner. After a user is assigned a guest OS, the connection between the guest OS and data owned by the user in storage center is then established. Figure 4 shows this relationship.

Fig. 3 Proposed Variance based IDS Architecture

Fig. 4 Connection between guest OS and storage center

In our paper, we divide security level into three, such as High, Medium and Low for effective IDS construction. Highlevel is a group which applies patterns of all known attacks and a portion of Variance detection method when it needs, for providing strong security services. Medium-level is a group of middle grade which apply patterns of all known attacks to rules for providing comparatively strong security service. Finally, Low-level is a group for flexible resource management which apply patterns of chosen malicious attacks that occur with high frequency and that affect fatally to the system. In Variance based IDS scheme, an IDS consumes more resource when providing higher level security, because higher level security apply more rules than lower level. On the other hand, if an IDS provides lower level security policy, then the amount of resource usage is decreased although the detecting power of attacks also drops. The assignment of VM to a user is determined in accordance with security level. The grade of VM is proportional to user criteria of Variance level. Variance levels of users are estimated by their behaviors during the usage of service based on saved user Variance level in system. For instance, when a user access Cloud Computing system first time, Variance based IDS judges Variance level of user using following matters: the user's IP coverage, vulnerable ports to attack, the number of ID/PW failure, and so on. The most important element for estimating Variance level is how fatal it is. The rest of judgment criteria are possibility to attack success, possibility to attack occurrence, and so on [1]. The fatal grade of an attack is the degree of impact to systems of the attack, which includes from personal information extortion to system control and destruction. Possibility to attack success is an experimental value which indicates the probability of success for an attack. Possibility to attack occurrence is a value based on the frequency of specific attack. Table II shows user risk level.

©IJEECS

(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 9 Issue: 2, 2012 TABLE II USER RISK LEVEL

Likelihood of incident scenario

Business Impact

Very Low

Very low 0

Low

Medium

High

1

2

3

Very High 4

Low

1

2

3

4

5

Medium

2

3

4

5

6

High

3

4

5

6

7

Very High

4

5

6

7

8

The criteria of Variance level for deciding security group with risk point is shown in Table IV. TABLE III ASSESSMENT OF VARIANCE

Variance activity traffic

Risk point

Attempt to administrator account without working time

8

Guest OS attempt to unauthorized memory space The user set Network Interface Card to promiscuous mode Traffic of a guest OS increases up to 500% than usual traffic IP address of user terminal is changed during the usage Cloud service

7

Host OS manager attempts to access some guest OSs

5

An guest OS attempts to other guest OSs

5

Traffic of a guest OS increases up to 300% than usual traffic

4

Administrator access some host OSs without notice

4

Login failure for 5 times

3

Unlicensed IP coverage

3

Known-vulnerable port number

3

Undertaking malicious probes or scans

3

Non-updated Guest OS

3

6 6

Risk point

Between guest OS connect session in the same host OS

2

Abnormal guest OS power-off

2

Traffic of a guest OS increases up to 150% than usual traffic

1

TABLE IV CRITERIA OF VARIANCE LEVEL

Variance based IDS defines the Variance behaviors by risk level policy such as Table I. The risk levels assign risk points in proportion to risk of Variance behavior. The criteria of behaviors for judging that some traffic is Variance are described in Table III [2]. Cloud Computing security system evaluates user Variance level according to assessment criteria in Table III. Variance based IDS accumulate risk point to each user when they are against more than one rule in assessment rules. Cloud Computing system deploys each VM to one of three security group. When a user is assigned a VM by the system first time, there is no data for determining which security level of IDS is suitable for the user, so a high-level IDS should be assigned to the user. Since first provisioning, the decision of which VM is to be assigned to the user may change according to Variance level of the user, and a migration may occur. Migration is a technique to move VM to other VM space [8]. In the case of existing users, they are judged by previous personal usage history, and assigned VMs with the security level derived by the judgment.

6

Variance activity traffic

IDS group

Standard

High-level IDS

More than 6

Medium-level IDS

3-5

Low-level IDS

0-2

Cloud Computing system checks users' behaviors everyday and decreases 1 risk point if a user uses Cloud Computing service more than one hour and increases less than 3 risk points a day. So many people would use Cloud Computing service, so the huge logs arise from transaction between systems, user information update, and mass data processing and so on. Therefore, it is very difficult to analyze using the logs in emergency. To make analyzing log better, we propose the method that divides log priority according to security level. The auditing priority of the logs is also decided by the Variance level of users. It means the logs generated by user who have most high Variance level are audited with top priority. On the other hand, logs of low-level users are audited at last. So our method can efficiently cope with potential attacks from the relatively more dangerous users than others. IV. ESTIMATION In this paper, our method increases resource availability of Cloud Computing system and handle the potential threats by deploying Variance based IDS and managing user logs per group according to Variance level. We can suppose that VMs have equal quantity of resource, then host OS can assign less guest OS with IDS, because IDS use much resource. On the other hands, we can assign more guest OS with Variance based IDS, because medium-level and low-level IDS use less resource. The users classified as high-level group are potentially dangerous user, therefore a high-level IDS consumes much resource to detect all of VARIANCE behaviors. However, a low-level IDS consumes less resource, because the user classified as low-level group are judged that they are normal user. As a result, low-level IDSs maintain little rules for managing effective resource, so it can assign more guest OS than high and medium-level. Our method also supports classifying the logs by Variance level, so it makes system administrator to analyze logs of the most suspected users first. Therefore our method provides high speed of detecting attacks. V. CONCLUSION Cloud Computing technology provides human to advantages such as economical cost reduction and effective resource management. However, if security accidents occur, ruinous economic damages are inevitable. Our paper

©IJEECS

(IJEECS) International Journal of Electrical, Electronics and Computer Systems. Vol: 9 Issue: 2, 2012 proposed Variance based IDS for effective resource and log management. Proposed method provides how we decrease the rule-set size of IDS and manages users' logs.

She is currently a Masters in Technology student at the Department of Computer Science Engineering of the Vaagdevi College of Engineering of Warangal. Her research interest lie in the areas of Security threats & countermeasures, network security, Deployment & Management of Security Systems and performance evaluation of computer networks.

REFERENCES

Lavanya Thota received the Bachelor of Technology degree in Information Technology from Jawaharlal Nehru Technological University of Hyderabad in 2007. Between 2007 and 2010 she was employed as a Lecturer in the Department of Computer Science Engineering at the Kakatiya Institute of Technology & Sciences of Warangal.

[1] [2] [3] [4] [5] [6]

[7] [8]

Wikipedia, http://en. wikipedia. org/wiki/Cloud_computing Enisa, Cloud Computing Risk Assessment, Nov. 2009 Roberto Di Pietro and Luigi V. Mancini, Intrusion Detection Systems, Springer, Jan. 2008. JaeHyuk Jang, Cisco, Cloud Computing: Drive Business Paradigm Shift, 2010. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, Dec.2009. N. Gruschka and M. Jensen, "Attack Surface: A Taxonomy for Attacks on Cloud Services," IEEE 3rd International Conference on Cloud Computing, pp.276-279,2010. Rebecca Bace and Peter Mell, NIST Special Publication on Intrusion Detection Systems, 16 Aug.2001. Kento S, Hitoshi. S, Satoshi. M, "A Model-based Algorithm for Optimizing I/O Intensive Applications in Clouds using VMBased Migration", 9th IEEE/ACM International Symposium, Cluster Computing and Grid, 2009.

Chaitanya Thota received the Bachelor of Technology degree in Information Technology from Jawaharlal Nehru Technological University of Hyderabad in 2007. Between 2007 and 2010 she is employed as a Lecturer in the Department of Computer Science Engineering at the Kakatiya Institute of Technology & Sciences of Warangal.

She is currently a Masters in Technology student at the Department of Computer Science Engineering of the Vaagdevi College of Engineering of Warangal. Her research interest lie in the areas of network security, denial of service attacks and performance evaluation of computer networks. Preethi M received the Masters of Technology degree in Computer Science Engineering from Kakatiya Institute of Technology & Sciences of Warangal in 2007. In the year 2008 she joined as a Lecturer in the Department of Computer Science Engineering at the Kakatiya Institute of Technology & Sciences of Warangal, presently she is an Assistant Professor in the same department. Her research interest lie in the areas of Network Security Applications Mobile and wireless network security, Denial of service protection, Intrusion Detection, and Distributed Systems security.

©IJEECS

IJEECS Paper Template

thin client Windows computing) are delivered via a screen- sharing technology ... System administrators. Fig. 1 Cloud Computing. IDS is an effective technique to protect Cloud Computing systems. Misused-based intrusion detection is used to detect ... isolated virtual hardware platform for operating guest OSs. Therefore ...

167KB Sizes 4 Downloads 304 Views

Recommend Documents

IJEECS Paper Template
virtual OS for users by using unified resource. Hypervisor is a software which enables several OSs to be executed in a host computer at the same time. Hypervisor also can map the virtualized, logical resource onto physical resource. Hypervisor is som

IJEECS Paper Template
Department of Computer Science & Engineering ... The code to implement mean filter in java language is as,. //smoothing ... getPixel(r,c); //get current pixel.

IJEECS Paper Template
Department of Computer Science & Engineering. Dr. B R Ambedkar .... To compute the value that express the degree to which the fuzzy derivative in a ..... Now she is working as a Associate Professor in Computer Science &. Engineering ...

IJEECS Paper Template
Increasing the number of voltage levels in the inverter without requiring higher rating on individual devices can increase power rating. The unique structure of multilevel voltage source inverter's allows them to reach high voltages with low harmonic

IJEECS Paper Template
not for the big or complex surface item. The example based deformation methods ... its size as it moves through the limb. Transition from each joint, the ellipsoid ...

IJEECS Paper Template
number of power semiconductor switches needed. Although lower voltage rated switches can be utilized in a multilevel converter, each switch requires a related gate drive circuit. This may cause the overall system to be more expensive and complex. Som

IJEECS Paper Template
accidents. Automatic recognition of traffic signs is also important for automated intelligent driving vehicle or driver assistance systems. This paper presents a new ...

IJEECS Paper Template
rise to many type of security threats or attacks. Adversary can ... data transmission. The message is sent ... in realizing security services like: authenticity, integrity,.

IJEECS Paper Template
B. M. Alargani and J. S. Dahele, “Feed Reactance of. Rectangular Microstrip Patch Antenna with Probe. Feed,” Electron letters, Vol.36, pp.388-390, 2000. [6].

Transactions Template - IJEECS
trol flow. There are two types of slicing namely static and dynamic slicing [7] .A static program slice comprises of those program statements that affects the value of a variable at some program point of interest which is referred as 'slicing cri- te

Transactions Template - IJEECS
The face space is defined by the “eigen-faces”, which are the eigen vectors of the set of faces. The block .... eigenvector and eigenvalue of WTW respective- ly,.

Transactions Template - IJEECS
Abstract—The resonant modes and characteristics of an equilateral triangular microstrip patch antenna with a variable air gap are theoretically and experimentally examined. Effect of varying parameters like dielectric constant of substrate, size of

Transactions Template - IJEECS
ISSN: 2221-7258(Print) ISSN: 2221-7266 (Online) www.ijeecs.org. Modified ..... vanced Information Networking and Applications Workshops. (AINAW 07), vol. 2.

Transactions Template - IJEECS
client server model doesn't support the slicing over the object oriented programs on ... slicing, Slice, Distributed System, Finite State Machine, Java Programming.

Transactions Template - IJEECS
INTERNATIONAL JOURNAL OF ELECTRICAL, ELECTRONICS AND COMPUTER SYSTEMS (IJEECS),. Volume ... ployed to validate the present theory for various .... Journal of Radio and Space Physics, vol. 35, pp. 293-. 296, 2006.(Journal).

Transactions Template - IJEECS
Dr. Harsh K Verma, Head, Department of Computer Science and Engi- neering,NIT jalandhar, E-mail: [email protected]. • Vaibhaw Dixit with the National Institute of Technology, Jalandhar,. Jalandhar, 144011. E-mail: [email protected]. The face

Paper Template - SAS Support
of the most popular procedures in SAS/STAT software that fit mixed models. Most of the questions ..... 10 in group 2 as shown with the following observations of the printed data set: Obs. Y ..... names are trademarks of their respective companies.

PMC2000 Paper Template - CiteSeerX
Dept. of Civil and Environmental Eng., Stanford University, Stanford, CA ... accurately follow the observed behavior of a large California ground motion database. .... rate of phase change, conditional on the amplitude level, to have a normal ...

Paper Template - SAS Support
Available support.sas.com/rnd/scalability/grid/gridfunc.html. Tran, A., and R. Williams, 2002. “Implementing Site Policies for SAS Scheduling with Platform JobScheduler.” Available support.sas.com/documentation/whitepaper/technical/JobScheduler.p

Paper Template - SAS Support
SAS® Simulation Studio, a component of SAS/OR® software, provides an interactive ... movement by shipping companies, and claims processing by government ..... service engineers spent approximately 10% of their time making service calls ...

CiC Paper Template
From Echocardiographic Image Sequence In Long-Axis View. Anastasia Bobkova, Sergey Porshnev, Vasiliy Zuzin. Institute of radio engineering, Ural Federal University of the First President of Russia B.N. Yeltsin. Ekaterinburg, Russia. ABSTRACT. In this

PMC2000 Paper Template
accurately follow the observed behavior of a large California ground motion database. ..... over a (coarse) grid, and various methods have been investigated to ...

IEEE Paper Template in A4 (V1) - icact
the SE-EE trade-off in multi-user interference-limited wireless networks ... International Conference on Advanced Communications Technology(ICACT).

I/ITSEC Author's Paper Template
MIST and INSPYRED are both free software available under GPL license and can ..... from this work, the implementation is offered under General Public License that allows ... Population - The Reference Model Runs with MIST Over the Cloud!