4.5 Article

Designing an efficient security framework for detecting intrusions in virtual network of cloud computing

期刊

COMPUTERS & SECURITY
卷 85, 期 -, 页码 402-422

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2019.05.016

关键词

Cloud computing; Virtual network security; Intrusion detection; Binary bat algorithm; Random Forest

资金

  1. Science and Engineering Research Board (SERB), Department of Science and Technology, Government of India [ECR/2017/001221]

向作者/读者索取更多资源

Cloud computing has grown for various IT capabilities such as IoTs, Mobile Computing, Smart IT, etc. However, due to the dynamic and distributed nature of cloud and vulnerabilities existing in the current implementations of virtualization, several security threats and attacks have been reported. To address these issues, there is a need of extending traditional security solutions like firewall, intrusion detection/prevention systems which can cope up with high-speed network traffic and dynamic network configuration in the cloud. In addition, identifying feasible network traffic features is a major challenge for an accurate detection of the attacks. In this paper, we propose a hypervisor level distributed network security (HLDNS) framework which is deployed on each processing server of cloud computing. At each server, it monitors the underlying virtual machines (VMs) related network traffic to/from the virtual network, internal network and external network for intrusion detection. We have extended a binary bat algorithm (BBA) with two new fitness functions for deriving the feasible features from cloud network traffic. The derived features are applied to the Random Forest classifier for detecting the intrusions in cloud network traffic and intrusion alerts are generated. The intrusion alerts from different servers are correlated to identify the distributed attack and to generate new attack signature. For the performance and feasibility analysis, the proposed security framework is tested on the cloud network testbed at NIT Goa and using recent UNSW-NB15 and CICIDS-2017 intrusion datasets. We have performed a comparative analysis of the proposed security framework in terms of fulfilling the cloud network security needs. (C) 2019 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computing

Rajendra Patil, Chirag Modi

JOURNAL OF SUPERCOMPUTING (2019)

Article Computer Science, Information Systems

Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing

Rajendra Patil, Harsha Dudeja, Chirag Modi

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Article Astronomy & Astrophysics

Intensity mapping with neutral hydrogen and the Hidden Valley simulations

Chirag Modi, Emanuele Castorina, Yu Feng, Martin White

JOURNAL OF COSMOLOGY AND ASTROPARTICLE PHYSICS (2019)

Article Astronomy & Astrophysics

Reconstructing large-scale structure with neutral hydrogen surveys

Chirag Modi, Martin White, Anze Slosar, Emanuele Castorina

JOURNAL OF COSMOLOGY AND ASTROPARTICLE PHYSICS (2019)

Article Astronomy & Astrophysics

Simulations and symmetries

Chirag Modi, Shi-Fan Chen, Martin White

MONTHLY NOTICES OF THE ROYAL ASTRONOMICAL SOCIETY (2020)

Article Green & Sustainable Science & Technology

Adaptive step size based drift-free P&O algorithm with power optimiser and load protection for maximum power extraction from PV panels in stand-alone applications

Madhu Gopahanal Manjunath, Chintamani Vyjayanthi, Chirag N. Modi

Summary: This paper introduces an adaptive step size based drift-free perturb and observe algorithm with power optimiser and load protection for maximum power extraction from photovoltaic panels in stand-alone applications. The algorithm adjusts the perturbation step size by continuously monitoring the absolute value of power change for fast tracking of maximum power point, reducing power loss, and providing load protection.

IET RENEWABLE POWER GENERATION (2021)

Article Computer Science, Hardware & Architecture

A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts

Ajit Muzumdar, Chirag Modi, G. M. Madhu, C. Vyjayanthi

Summary: This paper proposes a trustworthy and incentivized framework for smart grid energy trading using distributed ledger technology and smart contracts to address challenges in energy trading, such as transparency, data verification, privacy, and incentivization.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

Designing a blockchain-enabled privacy-preserving energy theft detection system for smart grid neighborhood area network

Ajit Muzumdar, Chirag Modi, C. Vyjayanthi

Summary: This research introduces a blockchain-enabled energy theft detection system that accurately detects energy theft and preserves consumer privacy in smart grid neighbourhood area networks.

ELECTRIC POWER SYSTEMS RESEARCH (2022)

Article Green & Sustainable Science & Technology

A permissioned blockchain enabled trustworthy and incentivized emission trading system

Ajit Muzumdar, Chirag Modi, C. Vyjayanthi

Summary: This paper proposes a trustworthy and incentivized emission trading system based on hyperledger and smart contracts to address the existing issues in emission trading systems. It introduces a priority based auction strategy to incentivize participants and achieve reliable and secure energy trading.

JOURNAL OF CLEANER PRODUCTION (2022)

Article Engineering, Electrical & Electronic

A real-time hybrid battery state of charge and state of health estimation technique in renewable energy integrated microgrid applications

Madhu Gopahanal Manjunath, Vyjayanthi Chintamani, Chirag Modi

Summary: This paper presents a novel real-time hybrid battery state of charge (SoC) and state of health (SoH) estimation technique for optimal operation in renewable energy integrated microgrid applications. The proposed technique accurately estimates the SoC and dynamically recalibrates it during idle conditions. It also estimates the SoH using a modified coulomb counting method and variation of battery capacity at different charge-discharge rates.

INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS (2023)

Article Computer Science, Information Systems

Designing a Robust and Accurate Model for Consumer Centric Short Term Load Forecasting in Microgrid Environment

Ajit A. Muzumdar, Chirag N. Modi, G. M. Madhu, Chintamani Vyjayanthi

Summary: The study proposes a model using technologies such as random forest, support vector regressor, and long short term memory for consumer's short term load forecasting. Experimental results show significant error reduction and adaptability to highly volatile and uncertain load patterns.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Information Systems

Investigation on Effect of Irradiance Change in Maximum Power Extraction From PV Array Interconnection Schemes During Partial Shading Conditions

G. M. Madhu, C. Vyjayanthi, Chirag N. Modi

Summary: This study analyzed the performance of a PV array under different shading and irradiance conditions through simulation studies and experimental verification. The research found that irradiance has a significant impact on the performance of the PV array, and needs to be considered as a design variable.

IEEE ACCESS (2021)

Proceedings Paper Automation & Control Systems

An Efficient Regional Short-Term Load Forecasting Model for Smart Grid Energy Management

Ajit Muzumdar, Chirag Modi, C. Vyjayanthi

IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners

P. Swathi, Chirag Modi, Dhiren Patel

2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT) (2019)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)