Data Sources and Datasets for Cloud Intrusion Detection Modeling and Evaluation

Over the past few years cloud computing has skyrocketed in popularity within the IT industry. Shifting towards cloud computing is attracting not only industry but also government and academia. However, given their stringent privacy and security policies, this shift is still hindered by many security concerns related to the cloud computing features, namely shared resources, virtualization and multi-tenancy. These security concerns vary from privacy threats and lack of transparency to intrusions from within and outside the cloud infrastructure. Therefore, to overcome these concerns and establish a strong trust in cloud computing, there is a need to develop adequate security mechanisms for effectively handling the threats faced in the cloud. Intrusion Detection Systems (IDSs) represent an important part of such mechanisms. Developing cloud based IDS that can capture suspicious activity or threats, and prevent attacks and data leakage from both inside and outside the cloud environment is paramount. One of the most significant hurdles for developing such cloud IDS is the lack of publicly available datasets collected from a real cloud computing environment. In this chapter, we discuss specific requirements and characteristics of cloud IDS in the light of traditional IDS. We then introduce the first public dataset of its kind for cloud intrusion detection. The dataset consists of several terabytes of data, involving normal activities and multiple attack scenarios, collected over multiple periods of time in a real cloud environment. This is an important step for the industry and academia towards developing and evaluating realistic intrusion models for cloud computing.

[1]  Rajiv Gandhi Salai,et al.  Virtual Host based Intrusion Detection System for Cloud , 2014 .

[2]  G. Fenu,et al.  An approach to a Cloud Computing network , 2008, 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT).

[3]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[4]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[5]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[6]  Sanjay Jha,et al.  Processing resource scheduling in programmable networks , 2005, Comput. Commun..

[7]  Fabrizio Baiardi,et al.  CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[8]  Ladan Tahvildari,et al.  Cloud Computing Uncovered: A Research Landscape , 2012, Adv. Comput..

[9]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[10]  Frederick R. Carlson,et al.  Security Analysis of Cloud Computing , 2014, ArXiv.

[11]  Sakshi Kaushal,et al.  Security Concerns in Cloud Computing , 2011, Grid 2011.

[12]  Aiko Pras,et al.  Inside dropbox: understanding personal cloud storage services , 2012, Internet Measurement Conference.

[13]  Dulal C. Kar,et al.  Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose , 2005 .

[14]  Sherri Davidoff Cleartext Passwords in Linux Memory , 2008 .

[15]  Ashutosh Saxena,et al.  Energy analysis of security for cloud application , 2011, 2011 Annual IEEE India Conference.

[16]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[17]  Jörg Schwenk,et al.  Security Prospects through Cloud Computing by Adopting Multiple Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[18]  Ralf Steinmetz,et al.  Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.

[19]  Malek Ben Salem,et al.  Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[20]  Daniel Högberg,et al.  An Applied Evaluation and Assessment of Cloud Computing Platforms , 2012 .

[21]  L. D. Dhinesh Babu,et al.  An Analysis of Security Related Issues in Cloud Computing , 2011, IC3.

[22]  Wei Zhao An Initial Review of Cloud Computing Services Research Development , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[23]  Chris Fry,et al.  Security Monitoring , 2009 .

[24]  Zhuang Jin-lia Research on Cloud Computing Security , 2014 .

[25]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[26]  Joaquim Sousa Pinto,et al.  Cloud Computing: A Platform of Services for Services , 2011, CENTERIS.

[27]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[28]  Paul Rodrigues,et al.  State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment , 2012, ICACCI '12.

[29]  Dongho Won,et al.  Security Issues and Threats According to the Attribute of Cloud Computing , 2012 .

[30]  Zhang Yongsheng,et al.  Cloud computing and cloud security challenges , 2012, 2012 International Symposium on Information Technologies in Medicine and Education.

[31]  Weimin Wei,et al.  A Deep Understanding of Cloud Computing Security , 2012 .

[32]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[33]  Weidong Liu,et al.  Security Issues and Solutions in Cloud Computing , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[34]  Manish Kumar Mishra,et al.  AN IMPROVED ROUND ROBIN CPU SCHEDULING ALGORITHM , 2012 .

[35]  Magda El Zarki,et al.  Mastering networks - an internet lab manual , 2003 .

[36]  Marvin Waschke Cloud standards: agreements that hold together clouds / Marvin Waschke , 2012 .

[37]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[38]  Alok Sharma,et al.  Detecting Denial of Service Attacks in the Cloud , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).