cloud intrusion detection model inspired by dendritic

16
Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism Azuan Bin Ahmad Prof. Dr. Norbik Bashah Idris Dr. Mohd Nazri Kama

Upload: azuan-ahmad

Post on 18-Feb-2017

36 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Cloud intrusion detection model inspired by dendritic

Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism

Azuan Bin AhmadProf. Dr. Norbik Bashah Idris

Dr. Mohd Nazri Kama

Page 2: Cloud intrusion detection model inspired by dendritic

Outline

• Introduction• Related Works• Dendritic Cell Mechanism• Cloud IDS Algorithm• Cloud IDS Model• Cloud IDS Experiment Network• Future Works• Conclusion

Page 3: Cloud intrusion detection model inspired by dendritic

Introduction

80%Malaysian

Firm Faced Cyber Attacks

2015[1]

Hacked in

2012[2]

Page 4: Cloud intrusion detection model inspired by dendritic

Sony Attack Incident 2011

Sony Playstation Network

Amazon EC2

Cloud

Compromised more than

100 million customer accounts

Page 5: Cloud intrusion detection model inspired by dendritic

Why Cloud Need Protection?

Distributed And Nested

A Lot of Information[1]

One Target for All

Publicly Available

Target of Distributed

Attack

No Dedicated IDS for Cloud[2]

Page 6: Cloud intrusion detection model inspired by dendritic

Current Cloud IDS Implementation

Need a lot of Self-

maintenance[3]

Different types of

IDS installed in each Cloud

Inter-VM Attacks will be

invisibleNetwork

Congestion

Page 7: Cloud intrusion detection model inspired by dendritic

Related Works• Cloud IDS model based on Virtual Machine Monitor[6]

– U. Tupakula, V. Varadharajan, and N. Akku– Works only on signature based IDS

• Software as a Service IDS[7]

– G. Nascimento and M. Correia– Focus on SaaS Cloud Environment– Didn’t use standard dataset for comparison

• Grid and Cloud Computing Intrusion Detection System (GCCIDS)[8]

– K. Vieira, A. Schulter, C. Westphall, and C. Westphall– IDS management is not centralize.

Page 8: Cloud intrusion detection model inspired by dendritic

Cloud IDS Model

Hybrid IDS

Methdology

Centralize IDS

management

Virtually Mirrored Network

Monitoring

Artificial Immune System

Real Implementation

Page 9: Cloud intrusion detection model inspired by dendritic

Dendritic Cell Mechanism

• Dendritic cells (DC) collects and present antigens to the adaptive immune system for processing.

• Monitoring the PAMP, Safe and Danger signal of the environment.

• Exist within three states – Immature– Semi-mature–Mature

Page 10: Cloud intrusion detection model inspired by dendritic

Cloud IDS Algorithm

Figure 1: Cloud IDS Algorithm

Page 11: Cloud intrusion detection model inspired by dendritic

Cloud IDS model

Figure 2: Cloud IDS Model

Page 12: Cloud intrusion detection model inspired by dendritic

Implementation

Figure 3: Cloud IDS Model Experiment Network

Page 13: Cloud intrusion detection model inspired by dendritic

Future Works

• Testing the Cloud IDS model with real Cloud data and environment.

• Applying different machine learning mechanism in analysing and improving Cloud IDS result.

Page 14: Cloud intrusion detection model inspired by dendritic

Conclusion

• Dendritic Cell is known for detecting and killing any pathogens that infected human tissue and cells.

• The successful of Dendritic Cell in protecting human body will also bring a success in protecting Cloud environment if the same mechanism are being implemented in the real world applications.

Page 15: Cloud intrusion detection model inspired by dendritic
Page 16: Cloud intrusion detection model inspired by dendritic

References[1] D. Gollmann, "Computer security," Wiley Interdisciplinary Reviews: Computational Statistics, vol. 2, pp. 544-554, 2010.[2] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and

Computer Applications, vol. 34, pp. 1-11, 2011.[3] W. Yassin, N. Udzir, Z. Muda, A. Abdullah, and M. Abdullah, "A Cloud-based Intrusion Detection Service framework," in Cyber Security,

Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, 2012, pp. 213-218.[4] Available online at

http://www.thestar.com.my/news/nation/2015/04/26/faster-bigger-and-sharper-cyber-criminals-are-stepping-up-their-game-to-trick-companies-and-digitall/

[5] BBC, "Google and Apple among hundreds hit in high-profile Pakistan hack," 26th November, 2012 2012. [6] U. Tupakula, V. Varadharajan, and N. Akku, "Intrusion detectiontechniques for infrastructure as a service cloud," in Dependable, Autonomicand Secure Computing (DASC), 2011 IEEE Ninth International Conferenceon, 2011, pp. 744-751.[7] G. Nascimento and M. Correia, "Anomaly-based intrusiondetection in software as a service," in Dependable Systems and NetworksWorkshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on,2011, pp. 19-24.[8] K. Vieira, A. Schulter, C. Westphall, and C. Westphall, "Intrusiondetection for grid and cloud computing," IT Professional Magazine, vol. 12, p.38, 2010.