An intrusion detection framework for supporting SLA assessment in Cloud Computing

Cloud Computing is the emerging paradigm in distributed environment. It is an opportunity for users to reduce costs and increase efficiency. Cloud Computing represents both a technology for using computing infrastructures in a more efficient way, and a business model for selling computing services and resources. In this context, cyber attacks represent a serious danger, which can compromise the quality of service delivered to the customers. In this paper, a mOSAIC-based framework for providing distributed intrusion detection in Cloud Computing is proposed. It is an architectural framework that collects information at different Cloud architectural levels, using multiple distributed security components, which can be used to perform complex event correlation analysis to identify intrusions in the Cloud system that involve Service Level Agreement violations.

[1]  Massimo Ficco,et al.  A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing , 2011, 2011 First International Conference on Data Compression, Communications and Processing.

[2]  Massimiliano Rak,et al.  Intrusion Tolerance in Cloud Applications: The mOSAIC Approach , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.

[3]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[4]  Irfan Gul,et al.  Distributed Cloud Intrusion Detection Model , 2011 .

[5]  Massimiliano Rak,et al.  Intrusion Tolerant Approach for Denial of Service Attacks to Web Services , 2011, 2011 First International Conference on Data Compression, Communications and Processing.

[6]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[7]  Schahram Dustdar,et al.  LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[8]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[9]  Carlos Becker Westphall,et al.  SLA Perspective in Security Management for Cloud Computing , 2010, 2010 Sixth International Conference on Networking and Services.

[10]  Salvatore Venticinque,et al.  Cloud Application Monitoring: The mOSAIC Approach , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[11]  Salvatore Venticinque,et al.  mOSAIC-Based Intrusion Detection Framework for Cloud Computing , 2012, OTM Conferences.

[12]  Francesco Palmieri,et al.  Towards a federated Metropolitan Area Grid environment: The SCoPE network-aware infrastructure , 2010, Future Gener. Comput. Syst..

[13]  Massimiliano Rak,et al.  Intrusion Tolerance of Stealth DoS Attacks to Web Services , 2012, SEC.

[14]  Piotr Bródka,et al.  International Conference on Computational Aspects of Social Networks , 2009, Computational Aspects of Social Networks.

[15]  Wei Xie,et al.  Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[16]  Adil M. Hammadi,et al.  A Framework for SLA Assurance in Cloud Computing , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[17]  Massimiliano Rak,et al.  Intrusion Tolerance as a Service - A SLA-based Solution , 2012, CLOSER.