DocumentCode
1754865
Title
Intrusion damage assessment for multi-stage attacks for clouds
Author
Arshad, Junaid ; Ajmal Azad, Muhammad ; Ali Jokhio, Imran ; Townend, Paul
Author_Institution
Dept. of CS & IT, Univ. of AJK, Kotli, Pakistan
Volume
7
Issue
12
fYear
2013
fDate
Aug. 13 2013
Firstpage
1304
Lastpage
1315
Abstract
Clouds represent a major paradigm shift from contemporary systems, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of flexible computing infrastructures that are available on demand. Clouds, however, introducing novel challenges particularly with respect to security that require dedicated efforts to address them. This study is focused at one such challenge, that is, determining the extent of damage caused by an intrusion for a victim virtual machine. It has significant implications especially with respect to effective response to the intrusion. This study presents the efforts to address this challenge for Clouds in the form of a novel scheme for intrusion damage assessment for Clouds. In addition to its context-aware operation, the scheme facilitates protection against multi-stage attacks. The study also includes the formal specification and evaluation of the scheme, which successfully demonstrate its effectiveness to achieve rigorous damage assessment for Clouds.
Keywords
cloud computing; formal specification; security of data; virtual machines; cloud computing; contemporary systems; context-aware operation; dynamic user requirements; flexible computing infrastructure; formal speciflcation; intrusion damage assessment; multistage attack; protection; security; victim virtual machine;
fLanguage
English
Journal_Title
Communications, IET
Publisher
iet
ISSN
1751-8628
Type
jour
DOI
10.1049/iet-com.2012.0707
Filename
6583149
Link To Document