16
Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism Azuan Bin Ahmad Prof. Dr. Norbik Bashah Idris Dr. Mohd Nazri Kama

Cloud intrusion detection model inspired by dendritic

Embed Size (px)

Citation preview

Page 1: Cloud intrusion detection model inspired by dendritic

Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism

Azuan Bin AhmadProf. Dr. Norbik Bashah Idris

Dr. Mohd Nazri Kama

Page 2: Cloud intrusion detection model inspired by dendritic

Outline

• Introduction• Related Works• Dendritic Cell Mechanism• Cloud IDS Algorithm• Cloud IDS Model• Cloud IDS Experiment Network• Future Works• Conclusion

Page 3: Cloud intrusion detection model inspired by dendritic

Introduction

80%Malaysian

Firm Faced Cyber Attacks

2015[1]

Hacked in

2012[2]

Page 4: Cloud intrusion detection model inspired by dendritic

Sony Attack Incident 2011

Sony Playstation Network

Amazon EC2

Cloud

Compromised more than

100 million customer accounts

Page 5: Cloud intrusion detection model inspired by dendritic

Why Cloud Need Protection?

Distributed And Nested

A Lot of Information[1]

One Target for All

Publicly Available

Target of Distributed

Attack

No Dedicated IDS for Cloud[2]

Page 6: Cloud intrusion detection model inspired by dendritic

Current Cloud IDS Implementation

Need a lot of Self-

maintenance[3]

Different types of

IDS installed in each Cloud

Inter-VM Attacks will be

invisibleNetwork

Congestion

Page 7: Cloud intrusion detection model inspired by dendritic

Related Works• Cloud IDS model based on Virtual Machine Monitor[6]

– U. Tupakula, V. Varadharajan, and N. Akku– Works only on signature based IDS

• Software as a Service IDS[7]

– G. Nascimento and M. Correia– Focus on SaaS Cloud Environment– Didn’t use standard dataset for comparison

• Grid and Cloud Computing Intrusion Detection System (GCCIDS)[8]

– K. Vieira, A. Schulter, C. Westphall, and C. Westphall– IDS management is not centralize.

Page 8: Cloud intrusion detection model inspired by dendritic

Cloud IDS Model

Hybrid IDS

Methdology

Centralize IDS

management

Virtually Mirrored Network

Monitoring

Artificial Immune System

Real Implementation

Page 9: Cloud intrusion detection model inspired by dendritic

Dendritic Cell Mechanism

• Dendritic cells (DC) collects and present antigens to the adaptive immune system for processing.

• Monitoring the PAMP, Safe and Danger signal of the environment.

• Exist within three states – Immature– Semi-mature–Mature

Page 10: Cloud intrusion detection model inspired by dendritic

Cloud IDS Algorithm

Figure 1: Cloud IDS Algorithm

Page 11: Cloud intrusion detection model inspired by dendritic

Cloud IDS model

Figure 2: Cloud IDS Model

Page 12: Cloud intrusion detection model inspired by dendritic

Implementation

Figure 3: Cloud IDS Model Experiment Network

Page 13: Cloud intrusion detection model inspired by dendritic

Future Works

• Testing the Cloud IDS model with real Cloud data and environment.

• Applying different machine learning mechanism in analysing and improving Cloud IDS result.

Page 14: Cloud intrusion detection model inspired by dendritic

Conclusion

• Dendritic Cell is known for detecting and killing any pathogens that infected human tissue and cells.

• The successful of Dendritic Cell in protecting human body will also bring a success in protecting Cloud environment if the same mechanism are being implemented in the real world applications.

Page 15: Cloud intrusion detection model inspired by dendritic
Page 16: Cloud intrusion detection model inspired by dendritic

References[1] D. Gollmann, "Computer security," Wiley Interdisciplinary Reviews: Computational Statistics, vol. 2, pp. 544-554, 2010.[2] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and

Computer Applications, vol. 34, pp. 1-11, 2011.[3] W. Yassin, N. Udzir, Z. Muda, A. Abdullah, and M. Abdullah, "A Cloud-based Intrusion Detection Service framework," in Cyber Security,

Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, 2012, pp. 213-218.[4] Available online at

http://www.thestar.com.my/news/nation/2015/04/26/faster-bigger-and-sharper-cyber-criminals-are-stepping-up-their-game-to-trick-companies-and-digitall/

[5] BBC, "Google and Apple among hundreds hit in high-profile Pakistan hack," 26th November, 2012 2012. [6] U. Tupakula, V. Varadharajan, and N. Akku, "Intrusion detectiontechniques for infrastructure as a service cloud," in Dependable, Autonomicand Secure Computing (DASC), 2011 IEEE Ninth International Conferenceon, 2011, pp. 744-751.[7] G. Nascimento and M. Correia, "Anomaly-based intrusiondetection in software as a service," in Dependable Systems and NetworksWorkshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on,2011, pp. 19-24.[8] K. Vieira, A. Schulter, C. Westphall, and C. Westphall, "Intrusiondetection for grid and cloud computing," IT Professional Magazine, vol. 12, p.38, 2010.