cloud monitoring and forensic using security metrics

14
CLOUD MONITORING AND CLOUD MONITORING AND FORENSIC USING SECURITY FORENSIC USING SECURITY METRICS METRICS Presented By: Sandeep Saxena Co-Author: Goutam Sanyal Galgotias college of Engineering & Technology, Greater Noida, India

Upload: sandeep-saxena

Post on 26-May-2015

321 views

Category:

Documents


0 download

DESCRIPTION

IEEE presentation on my paper

TRANSCRIPT

Page 1: Cloud Monitoring And Forensic Using Security Metrics

CLOUD MONITORING AND CLOUD MONITORING AND FORENSIC USING FORENSIC USING

SECURITY METRICSSECURITY METRICS

Presented By: Sandeep Saxena

Co-Author:Goutam Sanyal

Galgotias college of Engineering & Technology, Greater Noida, India

Page 2: Cloud Monitoring And Forensic Using Security Metrics

ContentsContents

INTRODUCTION

ANALYSIS OF PREVIOUS RESEARCHES

PROPOSED METHODOLOGY

PROPOSED GENERIC MODEL FOR CLOUD

MONITORING AND FORENSICS

CONCLUSION AND FUTURE WORK

REFRENCES

Page 3: Cloud Monitoring And Forensic Using Security Metrics

IntroductionIntroductionCloud computing is a new emerging technology in the era of

science. This immediately brings up several important questions like-

Why we use cloud computing? Is it real, or just another catchphrase? How does it affect us?

Cloud Computing : Cloud paradigm is used to enable expedient, on-demand network (cloud) access to a public pool of configurable computing resources ( e.g. networks, services, storage, application and services) that can be fast stipulated and released with minimal management effort or service provider interaction.

Page 4: Cloud Monitoring And Forensic Using Security Metrics

2 types of cloud:

1. Public Cloud

2. Private cloud

Figure 1 : Public cloud ( Service Provider) and Private Cloud ( On-Premises)

Page 5: Cloud Monitoring And Forensic Using Security Metrics

Analysis of Previous ResearchAnalysis of Previous Research

Validation security design is based on model and

methodology approaches. For example NIST

Security made presents telecommunication architecture as

combination of 3 layers:

a. Infrastructure level: The set of hardware and software

components that provide telecommunication functionality.

b. Service level: Billed customer traffic flows.

c. Application level: It motivates users to pay for the control

layer services.

Page 6: Cloud Monitoring And Forensic Using Security Metrics

Security Issues : Confidentiality , Integrity , Availability

For such issues , we need to monitor the user’s activity as

prevention measure to provide security to other users on

network.

Monitoring and Forensic is major concern of security for

taking appropriate action against intruder or attackers.

Architectural services of cloud computing:

a) Software-as-a-Service (SaaS): Salesforce.com, GoogleApps

etc.

b) Platform-as-a-Service(PaaS):Google Apps Engine

c) Infrastructure-as-a-service(IaaS): Amazon web services

Page 7: Cloud Monitoring And Forensic Using Security Metrics

According to Jennifer Bayuk : Iaas service provides secure network and storage services and Saas provides secure application service.

According to D.Zissis and D.Lekkas : Trusted third part implemented to provide strong authentication for financial transaction, authorization, data confidentiality and non repudiation.

According to Gary C. Kessler: Find root cause of forensics.

According to M. Tayor: Forensic experts install packet sniffers and monitoring tools on targeted machine to collect information. In private cloud it would be easy but in a public cloud it will be more difficult.

Page 8: Cloud Monitoring And Forensic Using Security Metrics

Proposed MethodologyProposed Methodology

Monitor Consumer Activity and Save Session log Records

Find any Malicious activity Match with Signature

Automated Forensic System will be activated to Store All Activities and

Data in Metrics

Stop Remote Access OR outside the cloud services ( at the same time

massage send to consumer on phone and Email )

Administrator check security metrics and collect Data then send

to higher authority for legal Processing

Figure 2 : Monitoring and Forensic Methodology

Page 9: Cloud Monitoring And Forensic Using Security Metrics

Proposed Generic Model for Cloud Proposed Generic Model for Cloud Computing and ForensicsComputing and Forensics

Here we proposed an complete architecture to provide service to our consumer included secure monitoring and forensic system.

Service level agreement ( SLA ) : Signed by Consumer.

In our architecture , we used Host- based IDS for monitoring of incoming and outgoing network communication on consumer system. IDS includes both anomaly detection and misuse detection techniques for identifying activities on host system.

It includes 6 steps which are shows in figure 2.

Page 10: Cloud Monitoring And Forensic Using Security Metrics

Figure 3: Generic architecture for cloud monitoring and forensic

Page 11: Cloud Monitoring And Forensic Using Security Metrics

Conclusion and Future workConclusion and Future work

We proposed a forensic methodology to assure the confidentiality of user of cloud.

Create security matrix and audit trail for investigation.

Establish service level agreement (SLA) with customer.

In future, focus on rule base security matrix and integrity of user’s data.

Page 12: Cloud Monitoring And Forensic Using Security Metrics

ReferencesReferences[1] Cary Landis and Dan Blacharski,“Cloud Computing

Made Easy” , Version 0.3.

[2] G. Stoneburner, “Underlying Technical Models for Information Technology Security,” National Institute of Standards and Technology, 2001

[3] G. McGraw, Software Security: Addison-Wesley,2006

[4] Google App Engine, http://appengine.google.com

[5]Amazon Elastic Compute Cloud(EC2), http://www.amazon.com/ec2

[6]Gary C. Kessler, “Anti-Forensic and the Digital Investigator” Champlain College Burlington, VT , USA Edith Cowan University, Mount Lawley, WA, Australia

Page 13: Cloud Monitoring And Forensic Using Security Metrics

[7] CSA cloud Security Alliance, top Threats to cloud Computing V1.0, 2010

[8] Shaftab Ahmad and M. yahin Akhtar Raja, “Tackling Cloud Security Issues And Forensic Model”, IEEE 2010

[9] Jennifer Bayuk, “Cloud Security Metrics”, 6th International Conference on System of Systems Engineering, Albuquerque, New Mexico, USA –June 27-30,2011 (IEEE)

[10] D. Zissis and D. Lekkas , “Addressing Cloud Computing Security issues”, Future Generation Computer System (2011) Elsevier, doi:10.1016/j.future.2010.12.006

[11] M.Tayor, J. Haggerty, D. Gresty and R. Hegarty, “Digital evidence in cloud computing systems”, Computer Law and Security Review 26 (2010)

Page 14: Cloud Monitoring And Forensic Using Security Metrics

THANK YOU