Abstract
Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper defense strategy for cloud systems. ACIRS continuously monitors and analyzes system events and computes security and risk parameters to provide risk assessment and mitigation capabilities with a scalable and elastic architecture with no central coordinator. It detects masquerade, host based and network based attacks and selects the appropriate response to mitigate these attacks. ACIRS is superior to NICE (Network Intrusion Detection and Countermeasure Selection system) in reducing the risk by 38 %. This paper describes the components, architecture, and advantages of ACIRS.















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Karen S, Peter M (2007) Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology(NIST). Special Publication, pp 800–894
Top Threats to Cloud Computing (2010) Cloud security alliance. http://www.cloudsecurityalliance.org/csaguide.pdf. V. 1.0
Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE ’08, pp 1–10
Jansen W, Karygiannis T (1999) Mobile agents and security. Special Publication, pp 800–819, NIST
Dastjerdi A, Abu Bakar K, Gholam SH (2009) Tabatabaei, distributed intrusion detection in clouds using mobile agents. In: 3\(^{rd}\) International Conf. on Advanced Engineering Computing and Application in Sciences, October 11, 2009—Sliema, Malta
Roschke S, Cheng F, Meinel (2009) Intrusion detection in the cloud. In: The 8th International Conference on Dependable, Autonomic and Secure Computing (DASC-09) China
Issac B, Israr N (eds) (2014) Case studies in secure computing-achievements and trends. CRC Press, Taylor and Francis, New York, USA 204
Vieira K, Schulter A, Westphall CB, Westphall CM (2010) Intrusion detection for grid and cloud computing. IT Prof 12(4), 38–43
Venkataramana K, Padmavathamma M (2012) Multi-agent intrusion detection and prevention system for cloud environment. Int J Comput Appl (0975–8887) 49(20)
Pratik PJ, Madhu BR (2013) Data mining based CIDS: cloud intrusion detection system for masquerade attacks [DCIDSM]. In: Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp 1–5
Kholidy HA, Baiardi F (2012) CIDD: a cloud intrusion detection dataset for cloud computing and Masquerade attacks. In: The 9th International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA
Thukral K, Zilpelwar A, Madiajagan M (2014) Proactive autonomous defense shield (PADS) for infrastructure as a service (IaaS). In: Proc. of the World Congress on Engineering 2014 Vol I, London, UK, WCE 2014
Lei J, Li ZT (2007) Using network attack graph to predict the future attacks. In: Second International Conference on Communications and Networking in China, 2007. CHINACOM ’07, pp 403–407
Shameli-Sendi A, Ezzati-jivan N, Jabbarifar M, Dagenais M (2012) Intrusion response systems: survey and taxonomy. IJCSNS Int J Comput Sci Netw Secur 12(1)
Roy A, Kim DS, Trivedi K (2012) Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. In: Proc. IEEE Int’l Conf. Dependable Systems Networks (DSN ’12)
Poolsappasit N, Dewri R, Ray I (2012) Dynamic security risk management using Bayesian attack graphs. IEEE Trans Depend Secur Comput 9(1):61–74
Foo B, Wu YS, Mao YC, Bagchi S, Spafford EH (2005) ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment. In: Proc. of DSN, pp 508–517
Gehani A, Kedem G (2004) Rheostat: real-time risk management. In: Proceedings of RAID, pp 296–314
Jahnke M, Thul C, Martini P (2007) Graph based metrics for intrusion response measures in computer networks. In: Proceedings of the IEEE LCN, pp 1035–1042
Chung CJ, Khatkar P, Xing T, Lee J, Huang D (2013) NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans Depend Secur Comput 10(4):198–211. doi:10.1109/TDSC.2013.8
Hisham A, Kholidy, Baiardi F, Hariri S (2014) DDSGA: a data-driven semi-global alignment approach for detecting Masquerade attacks. IEEE Trans Depend Secur Comput. doi:10.1109/TDSC.2014.2327966
Microsoft Private cloud. http://www.microsoft.com/en-us/server-cloud/private-cloud/default.aspx
VMware cloud. http://www.vmware.com/solutions/cloud-computing/index.html
Open stack. http://www.openstack.org/
Debar H, Curry D (2007) The intrusion detection message exchange format (IDMEF), rfc4765
Bereziński P, Śliwa J, Piotrowski J, Jasiul B (2016) Detection of multistage attack in ederation of systems environment. Military Communication Institute
OSSIM Manual. http://www.alienvault.com/documentation/index.html
Eucalyptus. http://www.eucalyptus.com/
Tupper M, Zincir-Heywood A (2008) VEA-bility security metric: a network security analysis tool. In: Proc IEEE Third Int’l Conf. Availability, Reliability and Security
Metasploit (2012). http://www.metasploit.com
Armitage (2012). http://www.fastandeasyhacking.com
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kholidy, H.A., Erradi, A., Abdelwahed, S. et al. A risk mitigation approach for autonomous cloud intrusion response system. Computing 98, 1111–1135 (2016). https://doi.org/10.1007/s00607-016-0495-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-016-0495-8