• DocumentCode
    25648
  • Title

    NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

  • Author

    Chun-Jen Chung ; Khatkar, Pankaj ; Tianyi Xing ; Jeongkeun Lee ; Dijiang Huang

  • Author_Institution
    Dept. of Comput. Sci., Arizona State Univ., Tempe, AZ, USA
  • Volume
    10
  • Issue
    4
  • fYear
    2013
  • fDate
    July-Aug. 2013
  • Firstpage
    198
  • Lastpage
    211
  • Abstract
    Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multistep exploitation, low-frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multiphase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph-based analytical models and reconfigurable virtual network-based countermeasures. The proposed framework leverages OpenFlow network programming APIs to build a monitor and control plane over distributed programmable virtual switches to significantly improve attack detection and mitigate attack consequences. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution.
  • Keywords
    cloud computing; computer network security; graph theory; virtual machines; DDoS attacks; NICE; OpenFlow network programming API; attack consequence mitigation; attack graph-based analytical model; cloud security; cloud system; cloud users; countermeasure selection mechanism; distributed programmable virtual switches; infrastructure-as-a-service clouds; large-scale distributed denial-of-service; multiphase distributed vulnerability detection measurement; network intrusion detection and countermeasure selection; reconfigurable virtual network-based countermeasures; security evaluations; virtual machines; virtual network systems; zombie exploration attack detection; Control systems; Correlation; Intrusion detection; Servers; Silicon; Software; Network security; attack graph; cloud computing; intrusion detection; zombie detection;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2013.8
  • Filename
    6419708