Detecting malicious insider threat in cloud computing environments
View/ Open
Keywords
Cloud computing ; System calls ; Intrusion detection system ; Authentication ; Steganography ; Smith Waterman ; Hypervisor ; XEN ; Νεφοϋπολογιστικά συστήματα ; Εκ των έσω απειλή ; Κλήσεις συστήματος ; Σύστημα ανίχνευσης παρεισφύσεων ; Αυθεντικοποίηση ; Στεγανογραφία ; ΕπόπτηςAbstract
Driven by the lack of focus on attacks, launched by malicious users, against modern Intrusion Detection Systems (IDSs) for Cloud Infrastructures, a real-time cloud observation mechanism is being proposed along with an augmented authenticator. The authenticator enhances the protection level of the data involved in cloud-based services, while the observation mechanism forms a novel detection method of malicious acts by Cloud insiders and incorporates a new implementation of the Smith Waterman algorithm based on CUDA technology. The proposed mechanisms have been evaluated in terms of the overhead that they introduce, justifying that proper execution, without exhausting the cloud infrastructure’s computational resources, is possible.