IEEE Transactions on Magnetics

advertisement
908
Vol.5, Issue.6
EID: A Procedure of Deducting Intrusion
and Taking Countermeasure Selection in
Virtual Networks
1
J. J.Mahankala Rao, 2K.Jagan Mohan
1
Assistant Professor , Dept. of CSE, D.M.S.S.V.H.Engineering College
2
B.TECH, Dept. of CSE, D.M.S.S.V.H.Engineering College

Index Terms-- EID; API; DDoS; Network.
Abstract-- Cloud security is one of most important issues that
have attracted a lot of research and development effort in past
few years. Particularly, attackers can explore vulnerabilities of
a cloud system and compromise virtual machines to deploy
further large-scale Distributed Denial-of-Service (DDoS). DDoS
attacks usually involve early stage actions such as multi-step
exploitation, low
frequency vulnerability scanning, and
compromising identified vulnerable virtual machines as
zombies, and finally DDoS attacks through the compromised
zombies. Within the cloud system, especially the Infrastructureas-a-Service (IaaS) clouds, the detection of zombie exploration
attacks is extremely difficult. This is because cloud users may
install vulnerable applications on their virtual machines. To
prevent vulnerable virtual machines from being compromised
in the cloud, we propose a multi-phase distributed vulnerability
detection,
measurement,
and
countermeasure
selection
mechanism called EID, which is built on attack graph based
analytical models and reconfigurable virtual network-based
countermeasures. The proposed framework leverages Open
Flow network programming APIs to build a monitor and
control plane over distributed programmable virtual switches
in order to significantly improve attack detection and mitigate
attack consequences. The system and security evaluations
demonstrate the efficiency and effectiveness of the proposed
solution.
I.INTRODUCTION
Recent studies have shown that users migrating to the cloud
consider security as the most important factor. A recent
Cloud Security Alliance (CSA) survey shows that among all
security issues [1-5], abuse and nefarious use of cloud
computing is considered as the top security threat, in which
attackers can exploit vulnerabilities in clouds and utilize
cloud system resources to deploy attacks. In traditional data
centers, where system administrators have full control over
the host machines, vulnerabilities can be detected and
patched by the system administrator in a centralized manner.
However, patching known security holes in cloud data
centers, where cloud users usually have the privilege to
control software installed on their managed VMs, may not
work effectively and can violate the service level agreement
(SLA). Furthermore, cloud users can install vulnerable
software on their VMs, which essentially contributes to
loopholes in cloud security. The challenge is to establish an
effective vulnerability/attack detection and response system
for accurately identifying attacks and minimizing the impact
of security breach to cloud users. In Armbrust et al.,
addressed that protecting “Business continuity and services
availability” from service outages is one of the top concerns
in cloud computing systems. In a cloud system, where the
infrastructure is shared by potentially millions of users,
abuse and nefarious use of the shared infrastructure benefits
attackers to exploit vulnerabilities of the cloud and use its
resource to deploy attacks in more efficient ways. Such
attacks are more effective in the cloud environment because
cloud users usually share computing resources, e.g., being
connected through the same switch, sharing with the same
data storage and file systems, even with potential attackers.
The similar setup for VMs in the cloud, e.g., virtualization
techniques, VM OS, installed vulnerable software,
www.semargroups.com
908
Vol.5, Issue.6
networking, and so on, attracts attackers to compromise
detection probability and improve the resiliency to VM
multiple VMs.
exploitation attack without interrupting existing normal
cloud services.
In this paper, we propose Network Intrusion detection and
3. EID employs a novel attack graph approach for attack
Countermeasure selection in virtual network systems (EID)
detection and prevention by correlating attack behavior
[6-8] to establish a defense-in-depth intrusion detection
and also suggests effective countermeasures.
framework. For better attack detection, EID incorporates
4. EID optimizes the implementation on cloud servers to
attack graph analytical procedures into the intrusion
minimize resource consumption. Our study shows that
detection processes. We must note that the design of EID
EID consumes less computational overhead compared to
does not intend to improve any of the existing intrusion
proxy-based network intrusion detection solutions.
detection algorithms; indeed, EID employs a reconfigurable
virtual networking approach to detect and counter the
The motivation of the work is to find Network Intrusion
attempts to compromise VMs, thus preventing zombie VMs.
detection and Countermeasure sElection in virtual network
In general, EID includes two main phases: 1) deploy a
systems (EID) to establish a defense-in-depth intrusion
lightweight mirroring-based network intrusion detection
detection framework. For better attack detection, EID
agent (EID-A) on each cloud server to capture and analyze
incorporates attack graph analytical procedures into the
cloud traffic. A EID-A periodically scans the virtual system
intrusion detection processes
vulnerabilities within a cloud server to establish Scenario
Attack Graph (SAGs), and then based on the severity of
identified vulnerability toward the collaborative attack
II. EXISTING SYSTEM ARCHITECTURE
Cloud users can install vulnerable software on their VMs,
goals, EID will decide whether or not to put a VM in
which essentially contributes to loopholes in cloud security.
network inspection state. 2) Once a VM enters inspection
The challenge is to establish an effective vulnerability/attack
state, Deep Packet Inspection (DPI) is applied, and/or
detection and response system for accurately identifying
virtual network reconfigurations can be deployed to the
attacks and minimizing the impact of security breach to
inspecting VM to make the potential attack behaviors
cloud users. In a cloud system where the infrastructure is
prominent. EID significantly advances the current network
shared by potentially millions of users, abuse and nefarious
IDS/ IPS solutions by employing programmable virtual
use of the shared infrastructure benefits attackers to exploit
networking approach that allows the system to construct a
vulnerabilities of the cloud and use its resource to deploy
dynamic reconfigurable IDS system. By using software
attacks in more efficient ways. Such attacks are more
switching techniques, EID constructs a mirroring-based
effective in the cloud environment since cloud users usually
traffic capturing framework to minimize the interference on
share computing resources, e.g., being connected through
users’ traffic compared to traditional bump-in-the-wire (i.e.,
the same switch, sharing with the same data storage and file
proxy-based) IDS/IPS. The programmable virtual
systems, even with potential attackers. The similar setup for
networking architecture of EID enables the cloud to
VMs in the cloud, e.g., virtualization techniques, VM OS,
establish inspection and quarantine modes for suspicious
installed vulnerable software, networking, etc., attracts
VMs according to their current vulnerability state in the
attackers to compromise multiple VMs.
current SAG. Based on the collective behavior of VMs in
the SAG, EID can decide appropriate actions, for example,
DPI or traffic filtering, on the suspicious VMs. Using this
Disadvantages of Existing System:
No detection and prevention framework in a virtual
approach, EID does not need to block traffic flows of a
networking environment. At the same time there is no
suspicious VM in its early attack stage. The contributions of
accuracy in the attack detection from attackers.
EID are presented as follows [11-13]:
1. We devise EID, a new multiphase distributed network
intrusion detection and prevention framework in a virtual
networking environment that captures and inspects
suspicious cloud traffic without interrupting users’
applications and cloud services.
2. EID incorporates a software switching solution to
quarantine and inspect suspicious VMs for further
investigation and protection. Through programmable
network approaches, EID can improve the attack
III. PROPOSED SYSTEM ARCHITECTURE
In this article, we propose EID ((A Procedure of deducting
intrusion and taking countermeasure selection in vns)to
establish a defense-in-depth intrusion detection framework.
For better attack detection, EID incorporates attack graph
analytical procedures into the intrusion detection processes.
We must note that the design of EID does not intend to
improve any of the existing intrusion detection algorithms;
www.semargroups.com
908
Vol.5, Issue.6
indeed, EID employs a reconfigurable virtual networking
approach to detect and counter the attempts to compromise
VMs, thus preventing zombie VMs.
Advantages of Proposed System:
The contributions of EID are presented as follows:
1. We devise EID, a new multi-phase distributed network
intrusion detection and prevention framework in a virtual
networking environment that captures and inspects
suspicious cloud traffic without interrupting users’
applications and cloud services.
2. EID incorporates a software switching solution to
quarantine and inspect suspicious VMs for further
investigation and protection. Through programmable
network approaches, EID can improve the attack
detection probability and improve the resiliency to VM
exploitation attack without interrupting existing normal
cloud services.
3. EID employs a novel attack graph approach for attack
detection and prevention by correlating attack behavior
and also suggests effective countermeasures.
4. EID optimizes the implementation on cloud servers to
minimize resource consumption. Our study shows that
Fig.1: EID architecture within one cloud server cluster
IV. FEASIBILITY STUDY
www.semargroups.com
908
Vol.5, Issue.6
Three key considerations involved in the feasibility analysis
are economical feasibility, technical feasibility, social
feasibility.
Economical Feasibility
This study is carried out to check the economic impact
that the system will have on the organization. The amount of
fund that the company can pour into the research and
development of the system is limited. The expenditures must
be justified. Thus the developed system as well within the
budget and this was achieved because most of the
technologies used are freely available. Only the customized
products had to be purchased.
Technical Feasibility
This study is carried out to check the technical
feasibility, that is, the technical requirements of the system.
Any system developed must not have a high demand on the
available technical resources. This will lead to high demands
on the available technical resources. This will lead to high
demands being placed on the client. The developed system
must have a modest requirement, as only minimal or null
changes are required for implementing this system.
Fig 3: Cloud server 1 viewing user memory details
SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance
of the system by the user. This includes the process of
training the user to use the system efficiently. The user must
not feel threatened by the system, instead must accept it as a
necessity. The level of acceptance by the users solely
depends on the methods that are employed to educate the
user about the system and to make him familiar with it. His
level of confidence must be raised so that he is also able to
make some constructive criticism, which is welcomed, as he
is the final user of the system.
Fig 4: Data owner page and he is Browsing data
Fig 5: Attacker reducing the memory size in virtual machine
V. CONCLUSION
Fig 2: Cloud server 1 and its functionalities.
www.semargroups.com
908
Vol.5, Issue.6
[12]
In this paper, we presented EID, which is proposed to detect
and mitigate collaborative attacks in the cloud virtual
networking environment. EID utilizes the attack graph
[13]
model to conduct attack detection and prediction. The
proposed solution investigates how to use the
programmability of software switches-based solutions to
improve the detection accuracy and defeat victim
exploitation phases of collaborative attacks. The system
performance evaluation demonstrates the feasibility of EID
and shows that the proposed solution can significantly
reduce the risk of the cloud system from being exploited and
abused by internal and external attackers. EID only
investigates the network IDS approach to counter zombie
explorative attacks. To improve the detection accuracy,
host-based IDS solutions are needed to be incorporated and
to cover the whole spectrum of IDS in the cloud system.
This should be investigated in the future work. Additionally,
as indicated in the paper, we will investigate the scalability
of the proposed EID solution by investigating the
decentralized network control and attack analysis model
based on current study.
.
X. Ou, S. Govindavajhala, and A.W. Appel, “MulVAL: A LogicBased Network Security Analyzer,” Proc. 14th USENIX Security
Symp., pp. 113-128, 2005.
R. Sadoddin and A. Ghorbani, “Alert Correlation Survey:
Framework and Techniques,” Proc. ACM Int’l Conf. Privacy,
Security and Trust: Bridge the Gap between PST Technologies and
Business Services (PST ’06), pp. 37:1-37:10, 2006.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
Coud Sercurity Alliance, “Top Threats to Cloud Computing v1.0,”
https://cloudsecurityalliance.org/topthreats/csathreats.
v1.0.pdf,
Mar. 2010.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A.
Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia, “A View of Cloud Computing,” ACM Comm., vol. 53, no.
4, pp. 50-58, Apr. 2010.
B. Joshi, A. Vijayan, and B. Joshi, “Securing Cloud Computing
Environment Against DDoS Attacks,” Proc. IEEE Int’l Conf.
Computer Comm. and Informatics (ICCCI ’12), Jan. 2012.
H. Takabi, J.B. Joshi, and G. Ahn, “Security and Privacy Challenges
in Cloud Computing Environments,” IEEE Security and Privacy,
vol. 8, no. 6, pp. 24-31, Dec. 2010.
“Open vSwitch Project,” http://openvswitch.org, May 2012.
Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J.
Barker, “Detecting Spam Zombies by Monitoring Outgoing
Messages,” IEEE Trans. Dependable and Secure Computing, vol. 9,
no. 2, pp. 198-210, Apr. 2012.
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee,
“BotHunter: Detecting Malware Infection through IDS-driven
Dialog Correlation,” Proc. 16th USENIX Security Symp. (SS ’07),
pp. 12:1-12:16, Aug. 2007.
G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting Botnet
Command and Control Channels in Network Traffic,” Proc. 15 th
Ann. Network and Distributed Sytem Security Symp. (NDSS ’08),
Feb. 2008.
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing,
“Automated Generation and Analysis of Attack Graphs,” Proc. IEEE
Symp. Security and Privacy, pp. 273-284, 2002,
“NuSMV: A New Symbolic Model Checker,” http://afrodite.itc.
it:1024/nusmv. Aug. 2012.
P. Ammann, D. Wijesekera, and S. Kaushik, “Scalable, graphbased
network vulnerability analysis,” Proc. 9th ACM Conf. Computer
and Comm. Security (CCS ’02), pp. 217-224, 2002.
www.semargroups.com
Download