• No results found

Intrusion Detection from Simple to Cloud

N/A
N/A
Protected

Academic year: 2021

Share "Intrusion Detection from Simple to Cloud"

Copied!
14
0
0

Loading.... (view fulltext now)

Full text

(1)

Intrusion Detection from Simple to

Cloud

David Mitchell

ICTN 6865 601

December 7, 2015

(2)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 1 of 13

Abstract

Intrusion detection was used to detect security vulnerabilities for a long time. The

methods used in intrusion detection have improved over time in order to keep up

with the hackers. The advancement in technology and Internet speeds have

contribute to improved intrusion detection systems. The challenges today are

these advancements have move more and more companies to virtualization in a

cloud environment. This new environment has created some challenges for

intrusion detection and protection systems. Intrusion detection system

developers realize the challenges for intrusion detection in the cloud environment

so they are beginning to improve the systems to protect this environment.

Companies have been concern with cloud security as they move more and more

data to a cloud environment.

(3)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 2 of 13

Introduction

Data in the cloud and cloud computing are emerging as a modern technology which developed in the last few years and considered as next big thing in years to come. The benefits such as reduced up-front investment, lower costs and more eco-friendly operation are moving more and more companies to storing their data in a cloud

environment. Cloud computing provides a distributed computing environment comprise of components like hardware, software, networking as well as services. Cloud computing is a collection of sources in order to enable resources sharing in terms of scalability, managed computing services that are delivered on demand over the network (Raghav, Chhikara, & Hasteer, 2013). Cloud services are delivered through third party. These services and resources are offered on a rental and user pay per usage. A large proportion of potential cloud customers are voicing misgivings with respect to how security and privacy are handled in the cloud. Security concerns in the cloud environment are the main obstacles in adoption (Keshavarzi, 2014).

Cloud services have created a challenge in security for the traditional intrusion

protection systems. The traditional intrusion detection system is not capable or flexible in providing security in cloud computing because of the distributed structure of cloud computing. Traditional intrusion detection system has been developed for a long time as a security mechanism for monitoring, and resisting the intrusion. Traditional network intrusion detection systems and hosted intrusion detection systems cannot identify suspicious activities in a cloud environment. Distributed model of cloud makes it vulnerable and prone to sophisticated distributed intrusion attacks like Cross Site Scripting and Distributed Denial of Service. A cloud environment deals with three types of architectures such as Software as a Service, Platform as a Service and Infrastructure as a Service. Cloud Service Providers that offer these services are now investing in protection the security of this cloud environment. However, they have face many challenges with security in a cloud environment. This paper will focused on some of the security intrusion detection system challenges and security concerns in a cloud

(4)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 3 of 13

Traditional Intrusion Detection Systems

Intrusion detection systems are software or hardware based systems that automate the process of monitoring the events that occur in a network and analyze them for malicious activities (Zarrabi & Zarrabi, 2012). Intrusion detection systems are classified into host-based intrusion detection systems and network-based intrusion detection systems. Figure 1 shows a traditional intrusion detection setup in a network.

Figure 1. Traditional Intrusion Detection system.

A host-based intrusion detection system installed on an individual host computer has its sensor built into the Intrusion detection software. HIDS analyzes the traffic to and from a specific computer. It has the ability to monitor key systems files and any attempt to overwrite these files. HIDS can be thought of as an agent that monitors and analyzes whether anything or anyone has circumvented the security policy (Host vs. Network Based Intrusion Detection Systems, 2005). HIDS are more focused on the local

machines changing aspect. HIDS does not matter where the machines are even if they are away from the network they will be protected at all times (Magalhaes, 2003).

(5)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 4 of 13 Network based intrusion detection systems attempts to discover unauthorized access to a computer network by capturing the network traffic packets such as UDP and TCP. NIDS consist of single-purpose sensors that are placed at various points in the network (Raghav, Chhikara, & Hasteer, 2013). NIDS can monitor the network traffic affecting multiple hosts that are connected to the network segment. A NIDS system can take actions when threats ae discovered. Figure 2 shows a traditional network based intrusion detection system.

Figure 2. Traditional network-based intrusion detection system.

Intrusion detection systems use two methods of detection, signature based and anomaly based detection. A signature-based IDS examines ongoing traffic, activity, transaction, or behavior for matches with known patterns of events specific to known attacks (Shah & Singh, 2012). Anomaly detection systems require you to make use of profiles for each user or group on the system (Jyothsna & Prasad, 2011). Anomaly detectors identify abnormal unusual behavior on a host or network. Anomaly detection approaches often require extensive training in order to characterize normal behavior patterns. IDS based on anomaly detection can often produce large number of false alarms.

(6)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 5 of 13

Cloud Service models

The National institute of Standards and Technology (NIST) and the industry have identified three common service models that are based on what cloud services are provided: applications, platform, and infrastructure (Keshavarzi, 2014). Figure 3 shows cloud service, SPI model and Cloud computing.

Figure 3. ACSIJ diagram of the SPI cloud model and services.

Software as a Service (SaaS) use the provider’s application running on a cloud infrastructure to be deliver to many users, regardless of their location. It allow activities to be managed from central location in a one-to-many model. The applications are maintained in the service provider’s datacenter, and every time users launch their browsers and log on, they get the latest version. The data is store in the provider’s datacenter.

Platform as a Service (PaaS) allows the creation of web applications quickly without the complexity of buying or maintain the infrastructure underneath it. It is deploy onto the cloud infrastructure acquired applications created using tools supported by the provider. The consumer does not manage or control the cloud infrastructure including network,

(7)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 6 of 13 servers, operating systems, or storage but has control over the deployed applications (Keshavarzi, 2014). Majority of Cloud Pulse survey respondents said they used PaaS to deploy cloud applications (Mann, 2013).

Infrastructure as a Service (IaaS) is the ability to programmatically create, manage and consume infrastructure elements that includes network, images, storage volumes, and computer resources according to Michael Fork (What is infrastructure as a Service?, 2014). A provider managed the physical cloud infrastructure while the consumer is allow to deploy and run their applications (Keshavarzi, 2014). IaaS is defined as computer infrastructure such as virtualization being delivered as a service. Organization are adopting IaaS solutions as a need to reduce burden cost and IT administration (Infrastructure as a Service (IaaS) Market Worth 56.05 Billion USD by 2020, 2015). Figure 4 show the cloud computing stack of the cloud service model. The cloud can provide the same technologies as “traditional” IT infrastructure but has limits with when using traditional intrusion detection systems.

Figure 4. Cloud service model stack.

Security issues in cloud environment

Clouds present security challenges which required dedicated efforts for their solutions when dealing with traditional intrusion detection systems. Traditional HIDS and NIDs cannot identify suspicious activities in a cloud environment. For example, encrypted

(8)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 7 of 13 communication may not be detected by NIDS. Some attacks may not be detected either by HIDS because it may not leave traces in the node operating system (Keshavarzi, 2014). Traditional security system lack the isolation from attacker or visibility of the monitored system. In addition, virtualization and cloud computing present additional security risks. Traditional IDS are not suitable for a cloud environment.

Clouds are subject to accidental and intentional security threats including confidentiality, integrity, and availability. Conventional security controls designed for traditional

hardware do not always work well in the cloud environment. The complexity of the cloud can stretch the limitations of a traditional IDS. The focus of network monitoring shift from managing infrastructure to managing services performance in a cloud environment (Blaisdell, 2015).

Data protection is a security concern in a cloud computing environment. The different kinds of data that need protection in a cloud environment include sensitive business information, personal identifiable information, telemetry data and geolocation data. Virtualization with virtual machines housed in a single physical system not maintain by the end user has contributed to the concerns of data protection in the cloud. Government entities have concern of where the physical equipment is location while using

virtualization. Government agencies are concern with where the physical equipment is location because of regulation and if it is location outside the country. Third party vendors such as cloud service providers provide the cloud environment to end users. End user have concerns how third party vendors are maintaining the equipment and software in this cloud computing environment. They are concern that this could lead to data vulnerable for internal data threats by the cloud service providers. End user also wonder if third party vendors are following their data handling practices to prevent data breaches (Switzer & Rajachandrasekar, 2014). Last year 43% of companies experience a data breach (Forrest, 2015).

Unauthorized access is a security concern for end users of cloud services. They are concern that an attacker may masquerade as a legitimate cloud user. This could be done by obtaining a legitimate user’s password or though password cracking tools. Unauthorized access can also be obtain by attacking the authentication service (Mathew & Jose, 2012). Unauthorized access to another client’s data could led to data breaches and attacks. Globally, 47% of cloud users have reported a data security issue within the last 12 months (Ashtorab & Taghizadeh, 2012).

(9)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 8 of 13 Some non-users of cloud services had concerns that data availability is an issue in a cloud environment. Cloud service providers are unable no obligation to prevent or inform the customer of data corruption or loss (Booth, Soknacki, & Somayaji, 2013). Customers have the ability to verify data availability by remotely access the information on a regular basis. However, bandwidth and computing restraints may limited their ability to accomplish the verification (Booth, Soknacki, & Somayaji, 2013). Most consumer are requiring a 99.99% in their service level agreements during contracts for cloud service data availability.

Virtual networks in the cloud introduces complexity due to administrative and user access points and multiple locations of data assets (Securing the Promise of

Virtualization, 2012). Twenty-nine percent of security professionals responded with a survey that stated lack of security visibility into cloud services infrastructure is a top risk (Weldon, 2014). Poor visibility into server vulnerabilities in a cloud environment

contributed to fail audits due to configuration drift. There have been some recommendations to remedy some of these security concerns.

Recommended solutions

Information Technology and security professionals have look for ways to integrate security and virtualization capabilities in a cloud environment. Cloud intrusion detection involves the gathering of information available in the network and host computers. This is based on the evaluation of data and attacks against vulnerable targets (Mathew & Jose, 2012). Multi-layer integrated intrusion detection system is one recommendation for effective IDS in a cloud environment. A solution of integrating knowledge and behavior analysis to detect cloud intrusion is a recommendation. The knowledge behavior will detect trails left attacks. The behavior will compare user actions to the usual behavior. Behavior based techniques help to complement the knowledge behavior because knowledge behavior has a deficiency in detecting new attacks (Mathew & Jose, 2012). Knowledge based intrusion detection has a low false-alarm rate and high positive rated. Cloud Security Providers is a recommended option to protecting your cloud

environment. Security as a service and Managed Security Services are two ways to protect your data in the cloud. Managed security services is a dedicated security service set up by service providers. Managed security service providers provides outsourced monitoring and management of security devices and systems. Security as a service is security delivered through the cloud instead of on site. The high demand for security as

(10)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 9 of 13 a service is caused by consumer’s lack of staff and skills according to Gartner (jaatun & Bernsmed, 2013).

Traditional models of data protection focuses on network and perimeter security with firewalls and intrusion detection systems. Vormetric Data Security offer a solution of protecting data inside of the operating environment while establishing security policies and maintain control through management interface (Data Security in the Cloud, 2014). They work with could providers and enterprise consumers to protect data in a cloud environment. Vormetric provides critical security intelligence information to SIEM solutions to allow identification of unauthorized access patterns that are a threat. There are many other companies that offer some services similar to Vormetric cloud security services.

Encryption is another approach to address security concerns. Cloud data encryption transforms data so that it is undecipherable without the key (Why protecting encryption keys is critical to keeping cloud data private, 2014). All data and communication need to be encrypted in a cloud environment. Organization should encrypt data during its

transfer through the network. It is also recommended that the data is encrypted before it is transferred to a cloud provider. Cloud providers should encrypt store data as a service to consumers. According to Thales, 74% of consumers believe that cloud service

providers is responsible for protecting sensitive and confidential data (Encryption in the Cloud, 2012). Encryption keys will need to be provided by the cloud security provider to the consumer so they can decrypt the encrypted data. These encryption keys can be managed by the consumer, third party service or cloud service providers. Cloud

providers may use software based solutions to protect key to reduce cost for multi-tenant environment (Encryption, 2012). A layer of protection can be added by letting third party proxy maintain the keys so the cloud service provider doesn’t have access to both the data and keys (Lawton, 2015).

Data availability and high availability for cloud environments can be address with a few recommendations. High availability are designed to maximize data loss and system downtime. Single point of failures can be eliminated with virtual machines in the cloud by utilizing virtual IP addresses (Security and high availability in cloud computing

environments, 2011). High availability is achieved by avoidance of single point of failures to achieve operational continuity and redundancy (Architecting High Availability Linux Environments within the Cloud, 2015). Dynamic scalability including load balancing will

(11)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 10 of 13 help with maintaining high availability. Crossover points could be implemented to

reroute activity until failed primary is back online in order to maintain high availability. Cloud intrusion detection system service provides security to cloud based

consumers. The cloud intrusion detection system includes an intrusion detection service agent, cloud computer service component and intrusion detection service component (Zarrabi & Zarrabi, 2012). The model for cloud intrusion detection system is based off software as a service. This agent in cloud intrusion detection systems sniff all internet inbound and outbound traffic.

Conclusion

More companies are moving to the cloud environment to reduce cost and technical staff. The cloud environment has introduce new challenges of cloud security because the traditional intrusion detection system can’t protect data in this environment. Intrusion detection systems have move from traditional physical equipment on site to protection in the cloud. The traditional intrusion detection system is not capable or provide protection due to distribute structure of the cloud. The companies that haven’t adopted the cloud environment are weary of data protection, unauthorized access, and data availability. Cloud service providers are implementing different methods to protection data in the cloud. They are offering security as a service, managed security services, and cloud intrusion detection systems. These services bring more confidence to the consumer to adopt the cloud environment.

Data encryption is a key component of protecting the data in the cloud. The data should be encrypted when transmitting data to the cloud service provider. The data should be encrypted when communication among virtual systems. Most cloud service provider are encrypting data when storing or transmitting consumer’s information. Encryption keys play an important role in data encryption. It is recommended that the encryption keys are managed by a third party vendor to add additional protection when using a cloud service provider.

Managed security services, security as a service and cloud security services will continue to benefit the cloud consumer as more and more consumer move to this environment. These products will continue to improve as more consumer migrate to a cloud environment.

(12)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 11 of 13

References

Architecting High Availability Linux Environments within the Cloud. (2015, February 24).

Retrieved from Rackspace:

http://www.rackspace.com/knowledge_center/whitepaper/architecting-high-availability-linux-environments-within-the-cloud

Ashtorab, V., & Taghizadeh, S. R. (2012). Security Threats and Countermeasures in Cloud Computing. Internatinoal Journal of Application or Innvation in Engineering &

Management, 234-243.

Blaisdell, R. (2015, October 15). Rickscloud. Retrieved from https://www.rickscloud.com/how-cloud-computing-is-changing-network-monitoring/

Booth, G., Soknacki, A., & Somayaji, A. (2013). Cloud Security: Attacks and Current Defenses. Albany: Annual Symposium on Information Assurance.

Data Security in the Cloud. (2014, September). Retrieved from Vormetric:

http://www.vormetric.com/sites/default/files/wp-data-security-in-the-cloud.pdf

(2012). Encryption. Cloud Security Alliance.

(2012). Encryption in the Cloud. Ponemon Institute.

Forrest, C. (2015, August 18). Cloud Security: 10 Things you need to know. Retrieved from TechRepublic: http://www.techrepublic.com/article/cloud-security-10-things-you

(2005). Host vs. Network Based Intrusion Detection Systems. SANS Institute.

Infrastructure as a Service (IaaS) Market Worth 56.05 Billion USD by 2020. (2015, November

30). Retrieved from PR Newswire:

http://www.prnewswire.com/news- releases/infrastructure-as-a-service-iaas-market-worth-5605-billion-usd-by-2020-558906341.html

jaatun, M., & Bernsmed, K. (2013). A briefing on Cloud Security Challenges and Opportunities. Telenor.

* Jyothsna, V., & Prasad, V. R. (2011). A Review of Anomaly based Intrusion Detection Systems. International Journal of Computer Applications, 26-33.

(13)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 12 of 13 * Keshavarzi, M. (2014). Tradtional Host based Intrusion Detection Systems' Challenges in

Cloud Computing. Advances in Computer Science: an International Journal, 133-137.

Lawton, S. (2015, April 30). Cloud Encryption: Using Data Encryption in the Cloud. Retrieved from Tom's IT Pro: http://www.tomsitpro.com/articles/cloud-data-encryption,2-913.html

Magalhaes, R. M. (2003, July 10). Host-Based IDS vs Network-Based IDS. Retrieved from Windows Security:

http://www.windowsecurity.com/articles-tutorials/intrusion_detection/Hids_vs_Nids_Part1.html

Mann, S. (2013, July). Retrieved from TechTarget:

http://searchcloudapplications.techtarget.com/feature/What-is-PaaS-Experts-explain-growing-role-in-as-a-service-family

* Mathew, S., & Jose, A. P. (2012). Securing Cloud from Attacks based on Intrusion Detection System. International Journal of Advanced Research in Computer and Communication

Engineering, 753-759.

* Raghav, I., Chhikara, S., & Hasteer, N. (2013). Intrusion Detection and Prevention in Cloud Environment: A Systematic Review. International Journal of Computer Applications, 7-10.

(2012). Securing the Promise of Virtualization. Mountain View: Symantec.

(2011). Security and high availability in cloud computing environments. Somers: IBM Global Services.

Shah, S. N., & Singh, P. (2012). Signature-Based Network Intrusion Detection System Using SNORT and WINPCAP. International Journal of Engineering Research & Technology, 1-6.

Switzer, D., & Rajachandrasekar, R. (2014). On Clouds, Cloud Security and Dependability. The Ohio State University.

Weldon, D. (2014, February 18). Visibility, control remain top cloud security concerns. Retrieved from Fiercecio: http://www.fiercecio.com/story/visibility-control-remain-top-cloud-security-concerns/2014-02-18

(14)

Intrusion Detection from Simple to Cloud | David Mitchell

Page 13 of 13

What is infrastructure as a Service? (2014, February 14). Retrieved from Thoughts on Cloud:

http://www.thoughtsoncloud.com/2014/02/what-is-infrastructure-as-a-service-iaas/

Why protecting encryption keys is critical to keeping cloud data private. (2014, March 20).

Retrieved from Cloud Best Practices:

http://www.cloudcomputing- news.net/news/2014/mar/20/when-deploying-cloud-data-encryption-protecting-encryption-keys-is-critical-to-keeping-cloud-data-private/

Zarrabi, A., & Zarrabi, A. (2012). Internet Intrusion Detection System Sevice in a Cloud.

International Journal of Computer Science, 308-314.

References

Related documents

The economic management of all the items in the pharmacy was done by the software by using the combination of conventional inventory control techniques such as ABC

24 As the table shows, commodity price shocks alone are successful at generating some of the distinctive features of the Argentine business cycle: Excess volatility of consumption

During the past few decades four East Asian economies - South Korea, Taiwan, Singapore and Hong Kong - have achieved the fastest rates of economic growth the world has ever seen.

Study of relation between coping ways with individual’s characters and mental health in infertile couples who refer to Yazd infertility center.. Tehran, Tarbiat

In addition to being implicated in norm creation and gaining of social control, we find that the use of accounting concepts such as transparency, accountability and value for money

There has been a research about tax inversions and the impact on the firm in the ways of tax benefits. There has recently been a lot of attention to these deals in the news and in

C Programme time may differ from the values in the "Programme and consumption table" depending on the water pressure, water hardness and temperature, ambient

These features are additional scaling methods for simple and canonical CA, missing data, and graphical representations such as regression plots, Benz´ ecri plots, transformation