• No results found

Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines

N/A
N/A
Protected

Academic year: 2021

Share "Improving Hypervisor-Based Intrusion Detection in IaaS Cloud for Securing Virtual Machines"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

Improving Hypervisor-Based Intrusion Detection

in IaaS Cloud for Securing Virtual Machines

1

Shabnam Kazemi, 2 Vahe Aghazarian, 3 Alireza Hedayati

1

Department of Computer, Kish International Branch, Islamic Azad University, Kish Island, Iran

2, 3

CE Department, Central Tehran Branch, Islamic Azad University, Tehran, Iran

Abstract - Cloud computing is a computer model that tries to facilitate the users’ access based on their request for the information and computing sources. In recent years, making the cloud against the attacks has become significantly important. One of the security methods is the use of intrusion detection systems. In these systems, when a suspicious event that represents an abuse occurs, warning are made to inform the production system managers. Source sharing is the most important part in cloud computing. Therefore, nowadays, cloud providers use the virtualization technology to share the sources, which is available in two levels including virtual machine and hypervisor. In the infrastructure, the cloud virtual machines are shared with other organizations virtual machines as the service. In this paper, it is tried to use the virtualization properties in the hypervisor level and improve the IDS in the infrastructure layer of cloud computing. In fact, genetic algorithm is used to improve IDS.

Keywords - Cloud Computing, Intrusion Detection System, Virtualization, Genetic Algorithm, Hypervisor-Based Intrusion.

1. Introduction

Intrusion detection systems (IDSs) are software or hardware mechanisms which helps the system to detect attacks against computer systems. IDS are composed different components such as sensors, console, and central engine. Sensors detect security events, console monitors events and Central Engine records events logged by the sensors in a database and use a system of rules to generate alerts from security events received. It is normally designed and used to monitor and detect the invalid activities of the connected nodes and the users which can harm the system resources, for the security of the system. It can keep a track record of user applications, networks or combination of activities to tack the known and unknown attacks [1]. Mainly Intrusion detection system provides the following features,

• Monitoring and analyzing the user’s activities and abnormal activity.

• Auditing the system configuration and vulnerabilities. • Critical System and data files integrity assessment and

generating alarms.

• Operating System activities analysis.

2. Approaches for Intrusion Detection

Anomaly Detection approach is based on the study of the “normal” behavior and creating a attributed model from this behavior. As abnormal behavior indicates the illegitimate use of the system so any behavior which deviates from the normal behavior is known as the anomalous [2] Main drawback of Anomaly based approach are it often requires extensive training in order to find out the normal behavior patterns and in many cases it provides the false alarms as particular normal user and system behavior can differ widely.

Misuse Detection approach is based on the principle that there exists a well defined record of already attempted intrusion attacks. These could be matched with the current preceding and an exact type of attack can be detected easily. So in Intrusion detection systems that use Misuse or Signature based detection looks for a certain match from a predefined pattern of events to track the known attacks [3]. Main advantages of the misuse detection approach are that false alarms are not often occurs and it does not require extensive training to detect attacks. Intrusion detection system is mainly classified in two categories based on the system monitoring. Network Intrusion Detection System (NIDS) that monitors the complete network traffic to track and detect proposed attacks on the network and inform administrator about the attack. Another category is called Host Based Intrusion Detection System (HIDS) that monitors a single host system. HIDS involves installing an

(2)

agent on the local host that monitors and reports on the system configuration and application activity.

3. Cloud Computing

Cloud computing is the mechanism of computing services delivery over the Internet. In cloud services individuals and businesses can use software and hardware facilities which are managed by third party at some remote locations. Some main examples of cloud services are online file storage, social networking sites (Facebook, Twitter etc), webmail, and online business applications etc. Cloud computing model provides the facility of accessing information and sharing the computer resources from anywhere through a remote network connection. Cloud computing provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications [4].

Main characteristics of the cloud computing are:

• On-demand self-service User / Organizations can request and manage their own computing resources, like network resources, storage, processing as per their requirements as choice.

• Broad network Access: Provides the capabilities to access the services on the internet and private networks thorough a mechanism enables access to client platforms (e.g., mobile phones, tablets, laptops, and workstations).

• Resource pooling: Provides the capabilities of accessing and using the multiple pooled computing resources, from different networks and remote data access points as required.

• Rapid elasticity: Services can be scaled and appropriated according to the requirements in any quantity at any time.

• Measured Services: Cloud systems always provide a automatic control of resources usage metering and billing accordingly (eg. user accounts, storage, bandwidth usage, processing). Resources usage are monitored and controlled in accordance with the services provided and availed.

Fundamental service models of cloud computing include software-as-a-service (Saas), platform-as-a-service (Paas) and infrastructure-as-a-service (Iaas). Software as a service model provides the access of complete services like operating software, database etc. to the user managed by the cloud providers. Cloud provider installs operating application software and provides the complete

infrastructure platform. Cloud user can access the facilities without any installation of any kind. In business oriented models Saas provides pricing applications to apply the subscription fee. Most commonly used Saas applications in use are salesforce.com, Google apps etc. In Platform as a service cloud provider manage complete hardware, network and a platform encapsulating a layer of software and provides it as a service that can be used to build higher-level services. Cloud user can build and run their own software solutions and applications according their own requirements without bothering about the basic requirements of hardware and operating layers and their maintenance. PaaS offerings can provide for every phase of software development and testing, or they can be specialized around a particular area such as content management.

In Infrastructure as a service model provides computers Physical or (more often) virtual machines (including storage and compute capabilities as standardized services over the network. Servers, storage systems, switches, routers, and other systems are pooled and made available to handle workloads to the cloud users. Could users run their own operating systems and applications to perform their tasks [5]. Moreover, cloud services can be made available mainly by three ways that include public clouds where cloud provider provides the storage, server and network resources to use for users.

These are normally used to deploy the services which may be made available to all the general (possible) cloud users. Email services, social networking sites and online photo storages are normally deployed through public cloud. Private cloud are built and deployed for some particular client or organization providing the utmost control over data, security, and quality of service to the user. Weather the infrastructure is maintained in own premises or by the cloud provided, the organization have the significant control on the resources of the Private cloud. Hybrid cloud combines the characteristics of both public and private models. The ability to supplement a private cloud with the resources of a public cloud can be used to maintain service levels for rapid workload fluctuations.

4. Genetic Algorithm

Genetic algorithm is the most popular type of evolutionary algorithm. In a genetic algorithm, a population of candidate solutions (called individuals, creatures, or phenotypes) to an optimization problem is evolved toward better solutions. Each candidate solution has a set of properties (its chromosomes or genotype) which can be mutated and altered; traditionally, solutions are represented in binary as strings of 0s and 1s, but other encodings are also possible. The evolution usually starts

(3)

from a population of randomly generated individuals, and is an iterative process, with the population in each iteration is called a generation. In each generation, the fitness of every individual in the population is evaluated; the fitness is usually the value of the objective function called “fitness function” in the optimization problem being solved. During the process of evaluation “Crossover” is used to simulate natural reproduction and “Mutation” is used to mutation of species. The more fit individuals are stochastically selected from the current population, and each individual's genome is modified (recombined and possibly randomly mutated) to form a new generation. The new generation of candidate solutions is then used in the next iteration of the algorithm. Commonly, the algorithm terminates when either a maximum number of generations has been produced, or a satisfactory fitness level has been reached for the population.

Although crossover and mutation are known as the main genetic operators, it is possible to use other operators such as regrouping, colonization-extinction, or migration in genetic algorithms [6].

A typical genetic algorithm requires:

1. A genetic representation of the solution domain, 2. A fitness function to evaluate the solution domain.

A standard representation of each candidate solution is as an array of bits. Arrays of other types and structures can be used in essentially the same way. The main property that makes these genetic representations convenient is that their parts are easily aligned due to their fixed size, which facilitates simple crossover operations. Variable length representations may also be used, but crossover implementation is more complex in this case. Tree-like representations are explored in genetic programming and graph-form representations are explored in evolutionary programming; a mix of both linear chromosomes and trees is explored in gene expression programming.

Once the genetic representation and the fitness function are defined, a GA proceeds to initialize a population of solutions and then to improve it through repetitive application of the mutation, crossover, inversion and selection operators. General working of genetic algorithm is shown figure 1.

Figure1: General scheme of Genetic Algorithm

5. Cloud Intrusion Detection Datasets

Hisham A. Kholidy et al.as in [7], proposed a Cloud Intrusion Detection Dataset (CIDD) that is the first one for cloud systems and that consists of both knowledge and behavior based audit data collected from both UNIX and Windows users. However the datasets are not sufficient for intrusion detection in cloud.

6. Limitations in the Existing System

Self-learning mechanism cannot be efficient for cloud as it require quick detection. The training time is high so it cannot be used for real time intrusion detection. SVM is effective only for low sample of data. In host based intrusion detection are host specific and not able to monitor entire network where in network based IDS are able to detect only known attacks. The continuous exchange of information between the nodes in distributed IDS reduces the performance of the system. There is no effective cloud intrusion detection datasets to correlate the attacks in cloud.

7. Proposed System

Ideal network architecture is to filter the network traffic before it enters inside the cloud infrastructure. To do so the Host based intrusion detection system is placed between router and Cloud Host in Security architecture for cloud is represented in Fig. 2. The router is used to filter the traffic by using IP access control list known as ACL. The IDS is placed below the router in order to examine the contents carried out by the packet. IDS examine the content against the cloud intrusion detection datasets Signatures. If IDS correlate any attacks it drops the request and alerts the user.

(4)

Figure 2: Security Architecture for Cloud

Based on the preliminaries in Section 4, each individual must appear as a chromosome. Proposed adopts a previously proposed chromosome structure [8, 9], which is in the form of one-dimensional list of fifteen elements. They represent fifteen genetic loci, which store six network features considered by our NIDS and the corresponding attack type. Table 1 outlines the features used to construct our chromosome.

Table 1.Feature of Chromosome

Feature Format Number of Genes

Duration h:m:s 3 Protocol Int 1 Source_port Int 1 Destination_port Int 1 Source_IP a.b.c.d 4 Destination_IP a.b.c.d 4 Attack_name Int 1

The population are produced from DARPA[10] network session training audit dataset, which contain seven network features and some auxiliary data. The data are extracted and arranged into fifteen elements. They signify the genes at the fifteen genetic loci of the chromosome as follows. Table 2 provides three sample chromosomes produced from three DARPA training data records.

Table2.Sample Chromosome

[0, 0, 2, 'rsh', 1022, 1021, 192, 168, 1, 30, 192, 168, 0, 20, 'rsh'] [0, 0, 40, 'telnet', 1914, 23, 192, 168, 1, 30, 192, 168, 0, 20, 'guess'] [0, 1, 24, 'telnet', 4356, 23, 192, 168, 0, 40, 192, 168, 0, 20, '-']_ Our population is derived from these training data’s chromosomes. All of the available values at each genetic locus of all chromosomes are extracted, with duplications removed, to produce the allele containing unique possible traits at that particular locus. Additionally, a wildcard symbolized by -1 is added to every allele, except for the allele of the last locus that identifies the attack name. As an example, based on the training data in Table 2, the

(5)

allele of the first locus becomes {0, -1}, that of the second locus is {0, 1, -1}, the one for the fourth locus gets to be {'rsh', 'telnet', -1}, where as the allele of the last locus is {'rsh', 'guess'}.

The fitness is evaluated by determining how many attack connections the rule matches.

support = |A and B| / N (1)

confidence = |A and B| / |A| (2)

fitness = (w1 x support) + (w2 x confidence)-(w3*10ିଵଷ) (3)

N is the total of number of network connection rules in the training dataset. |A| indicates the number of rules whose condition parts (i.e. the first 14 elements) match the condition A. |A and B| is the number of network connection rules whose condition parts match the condition A and outcome parts (i.e. the last element) match the outcome B. The weights w1 and w2, whose values sum to one, control the balance between the support

and the confidence, without crucial effect on the performance. The greater the value of w1, the simpler it is to identify network intrusions. On the contrary, higher w2

leads to more precise classification of the intrusions. The default values of w1 and w2 are 0.2 and 0.8 respectively. During the selection operation, a predefined number of individuals, normally 100% or 75% of the population, are randomly selected. These individuals are then passed on to the crossover operation, where individuals are randomly chosen, one pair at a time, as parents to mate. The probability for a pair to crossover is definable and is set to 0.8 by default.

Proposed system utilizes two-points crossover operation. Here, two points of reference among the 15 network features are randomly selected. Next, all genetic traits within that particular range are exchanged between the parents, returning two children from each pair of parents. An example of crossover operation is displayed in figure3.

Figure 3. Crossover Mutation operation involves altering one or more gene

values of the individuals. The likelihood for an individual to undergo mutation is determined by a definable mutation probability. The gene at every genetic locus is given a probability of 0.25 to be replaced by another value taken from the allele corresponding to that locus. Figure4 demonstrates an instance of our mutation operation.

Figure 4. Mutation

8. Performance Analysis

Effectiveness:

Cloud Intrusion Detection Datasets Effectiveness can be determined by calculating True Positive Ratio and False Positive Ratio as below.

1) True Positive Rate

True Positive rate is used to evaluate effectiveness of Cloud Intrusion datasets. Effectiveness is determined by sending attacks towards the cloud IDS in order to detect them. Attack has been send from attackers to the Management server. To evaluate the number of attacks detected by Cloud IDS. The whole injection composed of 50 random attacks. 47 out of 50 injections are alerted. This mean that 3 attacks are not found by cloud IDS. True Positive Rate is calculated using the following formula

(6)

TPR = ்௉

்௉ାிே∗ 100% (4) Where,

TP – An Attack has occurred and alarm has been raised FN- An Attack has occurred and but no alarm was raised

TPR = ସ଻

ସ଻ାଷ ∗ 100% = 94%

The acceptable level of true positive rate is 80%as in [11].In cloud IDS the TPR is 94% which makes 14% above the acceptable level is achieved. Based on the fact the Cloud intrusion detection datasets are 94% effective.

Figure5.Detection rate

2) False Positive Rate

False Positive Rate is used to determine the proportion false alert. The darpa Datasets along with 50 attacks, which result in a total of 400 packets are send to Management Server. Over this large traffic, 40 alerts are generated by cloud IDS. This result is same to the True Positive Ratio experiment. This conclude that injection of back false positive alerts ground traffic did not raise any false positive alert. So False Positive Rate with FP=0 is calculated using the following formula

FPR = ி௉

ி௉ା்ே∗ 100% (5) Where , TN = (Total packets – Attack Packets) (6) = 400-50 =350

TN = 400 - 50 = 350

FPR =

ଷହ଴ ା ଴ ∗ 100% = 0%

The FPR for cloud IDS is 0%. An Ideal Intrusion detection System should have False Positive Rate of 0%. So Cloud IDS is ideal.

9. Conclusion

Cloud intrusion detection datasets are able to detect cloud attacks. Cloud based IDS were able to detect 94% of Random sets of cloud attacks. By adding background traffic retrieved from darpa, IDS was able to detect the same percentage of attacks and no false positive alarm is raised while filtering background traffic.

References

[1] S. INSTITUTE, "Understanding Intrusion Detection System," SANS INTITUTE INFO SECTION READING ROOM, 2001.

[2] A. Zarrabi, "Internet Intrusion Detection System Ser-vice in a Cloud," IJCSI International Journal of Computer Science, 2012, vol. 9, no. 5.

[3] C. Lawrence, "Intrusion Prevention Systems: The Future of Intrusion Detection," in Intrusion Prevention Systems: The Future of Intrusion Detection, Auckland, 2004.

[4] Office of Privacy Commissioner Of CANADA, "www.priv.gc.ca," Introduction to Cloud Computing. [Online]. (accessed in Nov 18, 2014)

[5] M. Boniface, B. Nasser, J. Papay and S. C. Phillips, "Platform-as-a-Service Architecture for Real-Time Quality of Service Management in Clouds," in Internet and Web Applications and Services (ICIW), 2010 Fifth International Conference on, Barcelona.

[6] A. Ziarati, ""A multilevel evolutionary algorithm for optimizing nu-merical functions"," IJIEC, 2011, vol. 2. [7] Hisham A. Kholidy, Fabrizio Baiardi. A cloud intrusion detection dataset for cloud computing and masquerade attacks, new generations, in proc. Ninth International Conference on Information Technology- New Generations, 2012, pp. 397-402. [8] A.bakshi, and B.Yogesh. Securing Cloud from DDOS

Attacks Using Intrusion Detection System in Virtual Machine, in proc. Second International Conference on Communication Software and Networks, 2010, pp. 260-264.

[9] H. Li, and D. Liu. Research on Intelligent Intrusion Prevention System Based on Snort, in proc. International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 ,vol. 1, pp. 251-253.

[10] DARPA: , MIT Lincoln Laboratory, DARPA datasets, MIT,USA,

http://www.ll.mit.edu/mission/communications/ist/corp ora/ideval/data/index.html (accessed in August 29, 2014). 0 20 40 60 80 100 0 10 20 30 40 50

Detection Rate

Detection rate

(7)

[11] (2010), Symantec [online], Available : http://www.symantec.com/connect/articles/strategies-reduce-false-positives-false-negativesnids.

Author Profile

Shabnam Kazemi received the MSc degree in computer engineering from Azad University, International Branch, Kish, IRAN, in 2015. His current research interests are in the areas of communication and networking, and Information Technology.

Vahe Aghazarian received the MSc and Ph.D. degrees in computer engineering from Azad University, Sciences and Research Branch, Tehran, IRAN, in 2002, and 2007. He obtained the top student awards in MSc and Ph.D. courses. He is currently an assistant professor in the Department of Computer Science, Azad University, Central Branch, Tehran, IRAN. In 2008, Dr. Vahe Aghazarian won top researcher award in Azad University, Central Tehran Branch. His current research interests are in the areas of communication and networking, Internet QoS, Microprocessors, and Information Technology.

Alireza Hedayati: Completed his B.S., M.S. and Ph.D., studies in Computer Engineering in Iran, dated 2000, 2004, and 2011, respectively. He joined the Faculty of Computer Engineering Department at Islamic Azad University (Central Tehran Branch) in 2005. His research interests include Mobile value added services, Next generation networks, Network Management.

Figure

Figure 2: Security Architecture for Cloud
Figure 3. Crossover

References

Related documents

The research question asked about how the beliefs of educational accountability among single African American mothers related to any involvement in their children’s

[r]

PLO7 Skills in the planning and design of meaningful learning activities that support and have positive impact on student learning based upon knowledge of subject matter,

Learning from the examples of successful blogs by elementary teachers, four common types of classroom blogs with accompanying examples are shared: Classroom News Blogs, Mirror Blogs,

When the three-layer network is used as a three-terminal element by connecting conducting terminal strips across the ends of one of the resistive layers and the center of the

Figure 5.34 Temperature and species mole fraction distributions on two perpendicular vertical center-planes inside gasifier for concentric coal-oxidant injection case using

The export sales exceeded previous year’s and planned sales quantity figures as well.. Source of the increase was export to Ukraine