.

How to distribute the detection load among virtual machines to maximize the detection of distributed attacks in the cloud?

LAUR Repository

Show simple item record

dc.contributor.author Abdel Wahab, Omar
dc.contributor.author Bentahar, Jamal
dc.contributor.author Otrok, Hadi
dc.contributor.author Mourad, Azzam
dc.date.accessioned 2017-03-09T09:21:06Z
dc.date.available 2017-03-09T09:21:06Z
dc.date.issued 2017-03-09
dc.identifier.isbn 9781509026289 en_US
dc.identifier.uri http://hdl.handle.net/10725/5340
dc.description.abstract Security has been identified to be the principal stumbling-block preventing users and enterprises from moving their businesses to the cloud. The reason is that cloud systems, besides inheriting all the vulnerabilities of the traditional computing systems, appeal to new types of threats engendered mainly by the virtualization concept that allows multiple users' virtual machines (VMs) to share a common computing platform. This broadens the attack space of the malicious users and increases their ability to attack both the cloud system and other co-resident VMs. Motivated by the absence of any approach that addresses the problem of optimal detection load distribution in the domain of cloud computing, we develop a resource-aware maxmin game theoretical model that guides the hypervisor on how the detection load should be optimally distributed among its guest VMs in the real-time. The objective is to maximize the hypervisor's probability of detection, knowing that the attacker is dividing the attack over several VMs to minimize this probability. Experimental results on Amazon EC2 pricing dataset reveal that our model increases the probability of detecting distributed attacks, reduces the false positives, and minimizes the resources wasted during the detection process. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.title How to distribute the detection load among virtual machines to maximize the detection of distributed attacks in the cloud? en_US
dc.type Conference Paper / Proceeding en_US
dc.author.school SAS en_US
dc.author.idnumber 200904853 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.keywords Cloud computing en_US
dc.keywords Virtual machine monitors en_US
dc.keywords Monitoring en_US
dc.keywords Servers en_US
dc.keywords Games en_US
dc.keywords Hardware en_US
dc.keywords Computational modeling en_US
dc.identifier.doi http://dx.doi.org/10.1109/SCC.2016.48 en_US
dc.identifier.ctation Wahab, O. A., Bentahar, J., Otrok, H., & Mourad, A. (2016, June). How to distribute the detection load among virtual machines to maximize the detection of distributed attacks in the cloud?. In Services Computing (SCC), 2016 IEEE International Conference on (pp. 316-323). IEEE. en_US
dc.author.email azzam.mourad@lau.edu.lb en_US
dc.conference.date 27 June-2 July 2016 en_US
dc.conference.pages 316-323 en_US
dc.conference.place San Francisco, USA en_US
dc.conference.title 2016 IEEE International Conference on Services Computing en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url http://ieeexplore.ieee.org/abstract/document/7557468/ en_US
dc.orcid.id https://orcid.org/0000-0001-9434-5322
dc.publication.date 2016 en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account