Security and Trustworthiness in Cloud Computing

Slides:



Advertisements
Similar presentations
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
Advertisements

Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks - IEEE October 2007 CMSC Advanced Computer Networks Oleg Aulov CMSC.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
Packet Anomaly Intrusion Detection PAID Constantine Manikopoulos and Zheng Zhang New Jersey Center for Wireless Networking and Security (NJWINS) at NJIT.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Visual Solution to High Performance Computing Computer and Automation Research Institute Laboratory of Parallel and Distributed Systems
Karl Schnaitter and Neoklis Polyzotis (UC Santa Cruz) Serge Abiteboul (INRIA and University of Paris 11) Tova Milo (University of Tel Aviv) Automatic Index.
Chen Cheng1, Haiqin Yang1, Irwin King1,2 and Michael R. Lyu1
A Study on Feature Selection for Toxicity Prediction*
Computer Science Department 1 Load Balancing and Grid Computing David Finkel Computer Science Department Worcester Polytechnic Institute.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Virtualization in Data Centers Prashant Shenoy
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Chaotic Mining: Knowledge Discovery Using the Fractal Dimension Daniel Barbara George Mason University Information and Software Engineering Department.
A Survey on Interfaces to Network Security
LLNL-PRES This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.
WAC/ISSCI Automated Anomaly Detection Using Time-Variant Normal Profiling Jung-Yeop Kim, Utica College Rex E. Gantenbein, University of Wyoming.
Stream Clustering CSE 902. Big Data Stream analysis Stream: Continuous flow of data Challenges ◦Volume: Not possible to store all the data ◦One-time.
Anomaly detection Problem motivation Machine Learning.
Where Are the Nuggets in System Audit Data? Wenke Lee College of Computing Georgia Institute of Technology.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.
User Profiling for Intrusion Detection in Windows NT Tom Goldring R23.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Department of Computer Science Engineering SRM University
Effective Countermeasures Against Emerging Threats in the Future Internet Salvatore D’Antonio Consorzio Interuniversitario Nazionale per l’Informatica.
IIT Indore © Neminah Hubballi
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
“Study on Parallel SVM Based on MapReduce” Kuei-Ti Lu 03/12/2015.
Intrusion Detection Using Hybrid Neural Networks Vishal Sevani ( )
An Example of Course Project Face Identification.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 Finding Constant From Change: Revisiting Network Performance Aware Optimizations on IaaS Clouds Yifan Gong, Bingsheng He, Dan Li Nanyang Technological.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Implementation of Machine Learning and Chaos Combination for Improving Attack Detection Accuracy on Intrusion Detection System (IDS) Bisyron Wahyudi Kalamullah.
Towards Coastal Threat Evaluation Decision Support Presentation by Jacques du Toit Operational Research University of Stellenbosch 3 December 2010.
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Copyright © 2011, Performance Evaluation of a Green Scheduling Algorithm for Energy Savings in Cloud Computing Truong Vinh Truong Duy; Sato,
Acknowledgements Contact Information Anthony Wong, MTech 1, Senthil K. Nachimuthu, MD 1, Peter J. Haug, MD 1,2 Patterns and Rules  Vital signs medoids.
CISC Machine Learning for Solving Systems Problems Presented by: Ashwani Rao Dept of Computer & Information Sciences University of Delaware Learning.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Speaker Change Detection using Support Vector Machines V.Kartik, D.Srikrishna Satish and C.Chandra Sekhar Speech and Vision Laboratory Department of Computer.
Presentation Layer (Graphical User Interface) AppGUI Logic Layer (Business Logic and data access) Network Discovery Device Information Extraction Network.
Final Report (30% final score) Bin Liu, PhD, Associate Professor.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Miloš Kotlar 2012/115 Single Layer Perceptron Linear Classifier.
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
TUMOR BURDEN ANALYSIS ON CT BY AUTOMATED LIVER AND TUMOR SEGMENTATION RAMSHEEJA.RR Roll : No 19 Guide SREERAJ.R ( Head Of Department, CSE)
Department of Computer Science Punjabi University, Patiala
CSE CST Visualization Techniques for Intrusion Detection Steven Johnston Communications Security Establishment William Wright Oculus Info Inc. Workshop.
Course Project Lists for ITCS6157 Jianping Fan. Project Implementation Lists Automatic Image Clustering You can download 1,000,000 images from You can.
Experience Report: System Log Analysis for Anomaly Detection
ONR MURI area: High Confidence Real-Time Misuse and Anomaly Detection
Active Learning Intrusion Detection using k-Means Clustering Selection
An Enhanced Support Vector Machine Model for Intrusion Detection
Dieudo Mulamba November 2017
Roland Kwitt & Tobias Strohmeier
Machine Learning Week 1.
Automatic Discovery of Network Applications: A Hybrid Approach
Scale-Space Representation of 3D Models and Topological Matching
A survey of network anomaly detection techniques
Jeyanthi Hall Ph.D. Candidate - Carleton University
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Data Warehousing Data Mining Privacy
Modeling IDS using hybrid intelligent systems
Presentation transcript:

Security and Trustworthiness in Cloud Computing Bruno L. Dalmazo, João P. Vilela, Marília Curado {dalmazo, jpvilela, marilia}@dei.uc.pt CISUC, Department of Informatics Engineering, University of Coimbra Features An O0 O1 O2 O3 O4 ... On A0 A1 A2 A3 A4 An Individual similarity approach for each feature IDS output Alarm database Step 1 F0 F1 F2 F3 F4 Fn Step 2 Clustering relevant features Similarity approach for groups of alarms Features On Step 3 F Poisson Moving Average is based on a statistical model where observations are weighted with a Poisson distribution inside a sliding window 𝑃 𝑁 𝑡 =𝑘 = 𝑒 −𝜆𝑡 (𝜆𝑡) 𝑘 𝑘! A B 𝑆𝑖𝑚 𝐸𝐷 = 𝑖=1 𝑛 ( 𝑥 𝑖 − 𝑦 𝑖 ) 2 𝑆𝑖𝑚 𝑇𝑀 = 𝑖=1 𝑛 𝑥 𝑖 𝑦 𝑖 𝑖=1 𝑛 𝑥 𝑖 2 + 𝑖=1 𝑛 𝑦 𝑖 2 − 𝑖=1 𝑛 𝑥 𝑖 𝑦 𝑖 Reducing the number of messages sent to the server/administrator Using the number of occurrence of these groups to increase the severity of a single alarm Decreasing the network data traffic and its associated transfer costs DyWiSA is a Dynamic Window Size Algorithm focused on providing a standardized approach for evaluating the best candidate predictor models for cloud environments Trustworthiness Security (A) (F) Monitoring i % $ Traffic Predictor Alarm Management (C) i ☼ (3) Sliding Window SMA WMA EMA PMA Dynamic Window Size Algorithm 20 21 8 12 16 26 18 31 9 11 7 3 14 Predicted data flow Original data flow (1) (2) (5) (4) time t time t+1 Predictor Model (B) (E) i n Intrusion Detection System Management Probe Spoofing D-DoS n t (D) E F1 Fn F2 182 85 61 38 68 79 77 . Temporal layers from virtual machines 257 20 03 81 119 36 74 Feature Extraction Approach Feature vector Extracted feature vector C D Anomaly Detection Mechanism Cloud monitoring Event auditor Feature extraction approach SVM model (1) (5) (2) (4) 010 101111 --------------------------------------------- Σ±% Repository of outcomes (3) References [1] Dalmazo B. et al. Performance Analysis of Network Traffic Predictors in the Cloud. Journal of Network and Systems Management. Springer, 2017. [2] Dalmazo B. et al. Online traffic prediction in the cloud. International Journal of Network Management. John Wiley & Sons, 2016. [3] Dalmazo B. et al. Expedite Feature Extraction for Enhanced Cloud Anomaly Detection. IEEE/IFIP NOMS Workshop on Security for Emerging Distributed Network Technologies, 2016.