Cloud VM/Instance Monitor Phase-II (CIM-PII) Subsystem of eCloudIDS
Today cloud computing has established itself as a paradigm in delivering day-to-day on-demand solutions for most of the world’s IT corporates making it undoubtedly the most cost efficient method to use, maintain, and upgrade. Apart from the technical features, the corporate world is strongly driven by the striking ‘pay-as-you-go’ service model. Though the cloud has its advantages, organizations are apprehensive in migrating to a public cloud owing to its severe security challenges. Considering the fact that in present business world, data being an important enterprise asset, it needs to be protected with the highest priority. eCloudIDS, a next-generation security framework designed with a hybrid innovative two-tier expert engine is poised to be one of the most suitable security solution for cloud computing environments. The aim of eCloudIDS is to secure the environment of VMs on which the customers’ applications and data are deployed. One of the subsystem of eCloudIDS is the ‘CIM—Cloud VM/Instance Monitor’ responsible for monitoring the user events on the user specified VMs and instances. CIM is accountable for observing all the events of both authorized and unauthorized users (hackers) and advances them further for an instant capture of each and every activity for the configured VMs. In its initial phase (CIM-PI), the design and implementation of CIM was a successful prototypical experimentation that achieved the monitoring functionality at cloud virtual machine on an open source cloud computing software CloudStack enabled private test-bed. This work bolstered by the research findings and progress made subsequent to CIM-PI, describes the phase-II design and implementation of eCloudIDS architecture’s ‘Cloud VM/Instance Monitor (CIM-PII)’ with an enhanced monitoring and administration capabilities at VM operating system level including support of heterogeneity in logs.
KeywordsCloud security eCloudIDS iCloudIDM CIM-PII State-of-the-art cloud computing security taxonomies Cloud security framework
- 1.Madhan Kumar Srinivasan, K. Sarukesi, Paul Rodrigues, M. Saimanoj, P. Revathy, “State-of-the-art Cloud Computing Security Taxonomies – A classification of security challenges in the present cloud computing environment,” ACM, Aug. 2012, pp. 470–476, DOI: 10.1145/2345396.2345474.
- 2.Madhan Kumar Srinivasan, K. Sarukesi, K. Ashima, P. Revathy, “eCloudIDS – Design Roadmap for the Architecture of Next-generation Hybrid Two-tier Expert Engine-based IDS for Cloud Computing Environment,” Springer CCIS, Springer Verlag-Heidelberg, USA, Sep. 2012, pp. 358–371, Service Vol. 335, DOI: 10.1007/978-3-642-34135-9_36.
- 3.Madhan Kumar Srinivasan, K. Sarukesi, K. Ashima, P. Revathy, “eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation using Self-Organizing Map (SOM) for Secure Cloud Computing Environment,” Springer CCIS, Springer Verlag-Heidelberg, USA, Sep. 2012, pp. 432–443, Service Vol. 335, DOI: 10.1007/978-3-642-34135-9_42.
- 4.“Security Guidance for Critical Areas of Focus in Cloud Computing V2.1.,” Cloud Security Alliance, 2009.Google Scholar
- 5.“Top Threats to Cloud Computing V1.0.,” Cloud Security Alliance, 2010.Google Scholar
- 6.“Securing Multi-Tenancy and Cloud Computing,” Juniper Networks, 2012.Google Scholar
- 7.H. Li, J. Sedayao, J. Hahn-Steichen, E. Jimison, C. Spence, S. Chahal, “Developing an Enterprise Cloud Computing Strategy,” Intel Corporation, 2009.Google Scholar
- 8.M. Priyadharshini, R. Baskaran, Madhan Kumar Srinivasan, Paul Rodriques, “A Framework for Securing Web Services by Formulating a Collaborative Security Standard among Prevailing WS-* Security Standards,” Springer CCIS, Springer Verlag-Heidelberg, USA, Sep. 2012, pp. 269–283, Service Vol. 193, DOI: 10.1007/978-3-642-22726-4_29.
- 9.Madhan Kumar Srinivasan, K. Sarukesi, P. Revathy, “eCloudIDS Tier-1 iCloudIDM Layer-I (iCloudIDM-LI) Subsystem Design and Implementation through User-centric Identity Management Approach for Secure Cloud Computing Environment,” IEEE Computer Society, Italy, DOI: 10.1109/MDM.2013.95.
- 10.Madhan Kumar Srinivasan, K. Sarukesi, P. Revathy, “Architectural Design for iCloudIDM Layer-II (iCloudIDM-LII) Subsystem of eCloudIDS Generic Security Framework,” Proc. Of ICACCI 2013, IEEE, 2013.Google Scholar
- 11.M. Shiels, “Malicious insider attacks to rise,” Technical report, BBC News, 2009.Google Scholar
- 12.Madhan Kumar Srinivasan, K. Sarukesi, Revathy P, “Design Roadmap for the Phase-I Implementation of Cloud VM/Instance Monitor (CIM-PI) Subsystem of eCloudIDS Security Framework,” Elsevier, Aug. 2013, pp. 520–525, ISDN: 9789351071495.Google Scholar
- 13.W. Baker, A. Hutton, “2010 Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U.S. Secret Service and the Dutch High Tech Crime Unit,” Technical report, Verizon, New Jersey, 2010.Google Scholar
- 14.S. N. Dhage, B. B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra, “Intrusion detection system in cloud computing environment,” ACM, New York, USA, 2011, pp. 235–239, ISBN: 978-1-4503-0449-8, DOI: 10.1145/1980022.1980076.
- 15.Devarshi Ghoshal, Beth Plale, “Provenance from log files: a BigData problem,” ACM, New York, USA, 2013, pp. 290–297, ISBN: 978-1-4503-1599-9, DOI: 10.1145/2457317.2457366.
- 16.Turki Alharkan, Patrick Martin, “IDSaaS: Intrusion Detection System as a Service in Public Clouds,” IEEE Computer Society Washington DC, USA, 2012, pp. 686–687, ISBN: 978-0-7695-4691-9, DOI: 10.1109/CCGrid.2012.81.
- 17.Sanjay Ram M, Velmurugan N, Thirukumaran S, “Effective Analysis of Cloud Based Intrusion Detection System,” International Journal of Computer Applications & Information Technology, Vol. I, Issue II, September, 2012, ISSN: 2278-7720.Google Scholar
- 18.Claudio Mazzariello, Roberto Bifulco and Roberto Canonico, “Integrating a Network IDS into an Open Source Cloud Computing Environment,” IEEE, 2012, pp. 265–270, ISBN: 978-1-4244-7408-0/10.Google Scholar
- 19.B. Keerthi, Madhan Kumar Srinivasan, K. Sarukesi, Paul Rodrigues, “Implementation of Next-generation Traffic Sign Recognition System with Two-tier Classifier Architecture,” Proc. ACM ICACCI 2012, ACM, Aug. 2012, pp. 481–487, DOI: 10.1145/2345396.2345476.
- 20.B. Keerthi, Madhan Kumar Srinivasan, K. Sarukesi, “iReSign – Implementation of Next-generation Two-tier Identity Classifier-based Traffic Sign Recognition System Architecture using Hybrid Region-based Shape Representation Techniques,” Springer CCIS, Springer Verlag-Heidelberg, USA, Sep. 2012, pp. 408–421, Service Vol. 335, DOI: 10.1007/978-3-642-34135-9_40.