Skip to main content

Misuse Detection in a Simulated IaaS Environment

  • 503 Accesses

Part of the Lecture Notes in Computer Science book series (LNSC,volume 11263)

Abstract

Cloud computing is an emerging technology paradigm by offering elastic computing resources for individuals and organisations with low cost. However, security is still the most sensitive issue in cloud computing services as the service remains accessible to anyone after initial simple authentication login for significant periods. This has led to increase vulnerability to potential attacks and sensitive customer information being misused. To be able to detect this misuse, an additional intelligent security measures are arguably required. Tracking user’s activity by building user behaviour profiles is one technique that has been successfully applied in a variety of applications such as telecommunication misuse and credit card fraud. This paper presents an investigation into applying behavioural profiling in a simulated IaaS-based infrastructure for the purposes of misuse detection by verifying the active user continuously and transparently. In order to examine the feasibility of this approach within cloud infrastructure services, a private dataset was collected containing real interactions of 60 users over a three-week period (totalling 1,048,195 log entries). A series of experiments were conducted using supervised machine learning algorithms to examine the ability of detecting abnormal usage. The best experimental result of 0.32% Equal Error Rate is encouraging and indicates the ability of identifying misuse within cloud computing services via the behavioural profiling technique.

Keywords

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
EUR   29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR   42.79
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR   52.74
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cisco: Cisco global cloud index: forecast and methodology, 2016–2021. White Paper (2016)

    Google Scholar 

  2. Abdallah, E.G., Zulkernine, M., Gu, Y.X., Liem, C.: TRUST-CAP: a trust model for cloud-based applications. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 584–589. IEEE (2017)

    Google Scholar 

  3. Cloud Security Alliance: The Treacherous 12 Cloud Computing Top Threats in 2016. Security, pp. 1–34 (2016)

    Google Scholar 

  4. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference Computer Science and Electronics Engineering, vol. 1, pp. 647–651 (2012)

    Google Scholar 

  5. Walters, R.: Cyber attacks on U.S. companies in 2016. The Heritage Foundation: Issue Brief No. 4636 (2016)

    Google Scholar 

  6. Cameron, D.: Apple knew of iCloud security hole 6 months before Celebgate. The Daily Dot (2014). https://www.dailydot.com/debug/apple-icloud-brute-force-attack-march/. Accessed 27 Feb 2018

  7. Yadron, D.: Hacker collects 272 m email addresses and passwords, some from Gmail | Technology | The Guardian. The Guardian (2016). https://www.theguardian.com/technology/2016/may/04/gmail-yahoo-email-password-hack-hold-security. Accessed 10 Mar 2018

  8. Hall, J., Barbeau, M., Kranakis, E.: Anomaly-based intrusion detection using mobility profiles of public transportation users. In: 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2005, vol. 2, pp. 17–24 (2005)

    Google Scholar 

  9. Hilas, C., Kazarlis, S., Rekanos, I., Mastorocostas, P.: A genetic programming approach to telecommunications fraud detection and classification. In: Proceedings of 2014 International Conference on Circuits, System Signal Processing, Communications and Computers, pp. 77–83 (2014)

    Google Scholar 

  10. Ogwueleka, F.: Fraud detection in mobile communications networks using user profiling and classification techniques. J. Sci. Technol. 29, 31–42 (2009)

    Google Scholar 

  11. Qayyum, S., Mansoor, S., Khalid, A., Halim, Z., Baig, A.R.: Fraudulent call detection for mobile networks. In: 2010 International Conference on Information Emerging Technologies, pp. 1–5 (2010). https://doi.org/10.1109/iciet.2010.5625718

  12. Yazji, S., Dick, R.P., Scheuermann, P., Trajcevski, G.: Protecting private data on mobile systems based on spatio-temporal analysis (2011)

    Google Scholar 

  13. Yazji, S., Scheuermann, P., Dick, R.P., Trajcevski, G., Jin, R.: Efficient location aware intrusion detection to protect mobile devices. Pers. Ubiquitous Comput. 18, 143–162 (2014)

    Article  Google Scholar 

  14. Subudhi, S., Panigrahi, S.: Quarter-sphere support vector machine for fraud detection in mobile telecommunication networks. Procedia Comput. Sci. 48, 353–359 (2015)

    Article  Google Scholar 

  15. Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) Information Security, vol. 6531, pp. 99–113. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-18178-8_9

    Chapter  Google Scholar 

  16. Damopoulos, D., Menesidou, S.A., Kambourakis, G., Papadaki, M., Gritzalis, S., Clarke, N.: Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Secur. Commun. Netw. 5, 3–14 (2012)

    Article  Google Scholar 

  17. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Behaviour profiling on mobile devices. In: Proceedings of - EST 2010 - 2010 International Conference on Emerging Security Technologies, pp. 77–82 (2010). ROBOSEC 2010 - Robots and Security. LAB-RS 2010 - Learning and Adaptive Behavior in Robotic Systems

    Google Scholar 

  18. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Misuse detection for mobile devices using behaviour profiling. Int. J. Cyber Warf. Terror. 1, 41–53 (2011)

    Article  Google Scholar 

  19. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Active authentication for mobile devices utilising behaviour profiling. Int. J. Inf. Secur. 13, 229–244 (2014)

    Article  Google Scholar 

  20. Fridman, L., Weber, S., Greenstadt, R., Kam, M.: Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11, 513–521 (2017)

    Article  Google Scholar 

  21. Aupy, A., Clarke, N.: User authentication by service utilisation profiling. Adv. Netw. Commun. Eng. 2, 18 (2005). School of Computing, Communications & Electronics, University of Plymouth

    Google Scholar 

  22. Yazji, S., Chen, X., Dick, R.P., Scheuermann, P.: Implicit user re-authentication for mobile devices. In: Zhang, D., Portmann, M., Tan, A.H., Indulska, J. (eds.) Ubiquitous Intelligence and Computing, vol. 5585, pp. 325–339. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02830-4_25

    Chapter  Google Scholar 

  23. Salem, M.B., Stolfo, S.J.: Modeling user search behavior for masquerade detection. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) Recent Advances in Intrusion Detection, vol. 6961, pp. 181–200. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23644-0_10

    Chapter  Google Scholar 

  24. Yang, Y.: Web user behavioral profiling for user identification. Decis. Support Syst. 49, 261–271 (2010)

    Article  Google Scholar 

  25. Abramson, M., Aha, D.: User authentication from web browsing behavior. In: Twenty-Sixth International FLAIRS Conference, pp, 268–273 (2013)

    Google Scholar 

  26. Sola, J., Sevilla, J.: Importance of input data normalization for the application of neural networks to complex industrial problems. IEEE Trans. Nucl. Sci. 44, 1464–1468 (1997)

    Article  Google Scholar 

  27. Wu, X., et al.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14, 1–37 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Nathan Clarke , Paul Dowland or Fudong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Bayati, B., Clarke, N., Dowland, P., Li, F. (2018). Misuse Detection in a Simulated IaaS Environment. In: Saracino, A., Mori, P. (eds) Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science(), vol 11263. Springer, Cham. https://doi.org/10.1007/978-3-030-04372-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-04372-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-04371-1

  • Online ISBN: 978-3-030-04372-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics