DocumentCode :
576825
Title :
A Proposed Framework for the Active Detection of Security Vulnerabilities in Multi-tenancy Cloud Systems
Author :
Flood, Jason ; Keane, Anthony
Author_Institution :
Dept. of Inf., Inst. of Technol. Blanchardstown, Dublin, Ireland
fYear :
2012
fDate :
19-21 Sept. 2012
Firstpage :
231
Lastpage :
235
Abstract :
The detection of cyber attacks before they are successful represents an essential stage in the evolution of an attack vector centric security framework. Anti-virus, Malware and Firewalls detection & protection ideologies are proving to be ineffective and they were never designed with multi-tenant cloud environments in mind. The current security solution development is driven by the complexity of the gap analysis performed by hacker groups and multi-tenant cloud solutions represent a significant target to hacker groups so it is important for Cloud providers to take pre-emptive steps to ensure the total security of their services. A multi-tenant environment irrespective of the number of users is still an individual system and multi-tenant cloud solutions require active protection as the individual system components can still be compromised with a previously unknown attack vector. One possible solution to this growing security concern is an approach that continuously validates user interactions within a system and takes automated preemptive steps to promote the protection of the system users. By gathering information on the attack vector and the attacker themselves it is possible to predict the aim of the attack, gauging the risk and making assumptions. The ultimate goal is to identify and close the attack vector during the attackers gap analysis while ensuring at all time that the information gathered can be isolated to a legal forensic standard. With the ultimate goal being the ability to share malicious user activity information with authorities without the risk of accidental data leakage of other tenants data. This paper describes a possible system and methodology that would prevent the gap analysis phase of a cyber-attack.
Keywords :
cloud computing; firewalls; invasive software; vectors; active detection; anti-virus detection; attack vector centric security framework; cloud providers; cyber attacks detection; firewalls detection; malware detection; multi-tenancy cloud systems; security vulnerabilities; Companies; Databases; Informatics; Security; Training; Vectors; cybercrime; forensics; multi-tenancy security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Intelligent Data and Web Technologies (EIDWT), 2012 Third International Conference on
Conference_Location :
Bucharest
Print_ISBN :
978-1-4673-1986-7
Type :
conf
DOI :
10.1109/EIDWT.2012.43
Filename :
6354747
Link To Document :
بازگشت