The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

Conference paper


Pitropakis, N, Lyvas, C and Lambrinoudakis, C (2017). The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization. Athens 19 - 21 Feb 2017
AuthorsPitropakis, N, Lyvas, C and Lambrinoudakis, C
TypeConference paper
Abstract

The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their quest came to end with the birth of Cloud Computing infrastructures. However, along with the new promising technology, new attack vectors were born, and one old and known threat, that of Malicious Insiders reappeared. Insiders can use their privileged position inside the Cloud infrastructure to accomplish or help in attacks against a Cloud infrastructure. In this paper, we propose a practical and efficient intrusion detection system solution for Cloud infrastructures based on Graphical Processing Unit (GPU) acceleration. Our solution monitors the deployed virtual machines operations and especially those of the host Operating System’s, known as Dom0, correlating the collected information to detect uncommon behavior based on the SmithWaterman algorithm. Our proposal makes possible the cooperation of a variety of known hypervisors along with every known GPU acceleration unit used, thus offering the maximum of security mechanics while at the same time minimizing the imposed overhead in terms of Central Processing Unit (CPU) usage.

Keywordss-Cloud Computing; Security; Malicious Insider; IDS; GPU; Acceleration
Year2017
Accepted author manuscript
License
File Access Level
Open
Publication dates
Print19 Feb 2017
Publication process dates
Deposited23 Feb 2018
Accepted10 Feb 2017
Permalink -

https://openresearch.lsbu.ac.uk/item/87067

Download files


Accepted author manuscript
CLOUD COMPUTING 2017 Proceedings.pdf
License: CC BY 4.0
File access level: Open

  • 206
    total views
  • 40
    total downloads
  • 2
    views this month
  • 1
    downloads this month

Export as

Related outputs

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture.
Chrysoulas, C and Pitropakis, N (2018). Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. 4, pp. e4-e4. https://doi.org/10.4108/eai.10-1-2018.153551
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Kintis, P, Miramirkhani, N, Lever, C, Chen, Y, Romero-Gómez, R, Pitropakis, N, Nikiforakis, N and Antonakakis, M (2017). Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. Association of Computer Machinery's Computer and Communications Security (ACM CCS) 2017. Dallas, Texas USA 30 Oct - 02 Nov 2017 https://doi.org/10.1145/3133956.3134002
The far side of mobile application integrated development environments
Lyvas, C, Pitropakis, N and Lambrinoudakis, C (2016). The far side of mobile application integrated development environments. 13th International Conference Trust, Privacy and Security in Digital Business. Porto, Portugal 07 - 08 Sep 2016 Springer. https://doi.org/10.1007/978-3-319-44341-6_8