Abstract
Security is a major challenge in Cloud Computing. In this paper, we propose an Online Smart Disguise Framework (OSDF). OSDF employs dynamic, proactive, real-time moving-target defense against cloud attacks. OSDF relies on two main pillars. The first, is a behavior obscuring module that frequently live-migrates virtual machines (VMs) between heterogeneously configured compute nodes to avoid co-residency and virtualization based attacks. The second module limits attack dispersion between same-host VMs by migrating maliciously behaving VMs to remote isolated compute node acting as a quarantine zone. The second module is guided by a smart intrusion detection system that monitors the VM system calls searching for suspicious activities. To evaluate OSDF efficiency and effectiveness on limiting attack dispersion, we devised the vulnerable, exposed, attacked, recovered model based on the susceptible, exposed, infected, recovered (SEIR) epidemic model. The SEIR model is an epidemiological model commonly used to investigate disease dispersion on cooperative communities. The implementation of OSDF is tested on OpenStack private cloud. Simulation results show the effectiveness of OSDF MTD approach in decreasing the number of attacked VMs even for fast-spreading worms. Furthermore, NAS Parallel Benchmark is used to evaluate OSDF efficiency for cloud-hosted VMs running both stateful and stateless applications.

















Similar content being viewed by others
References
Adore worm: https://www.f-secure.com/v-descs/adore.shtml
Npb: https://www.nas.nasa.gov/publications/npb_problem_sizes.html/
Openstack: https://www.openstack.org/software/
sysbench: https://www.howtoforge.com/how-to-benchmark/-your-system-cpu-file-io-mysql-with-sysbench
Abed, A.S., Clancy, C., Levy, D.S.: Intrusion detection system for applications using linux containers. In: International Workshop on Security and Trust Management, pp. 123–135. Springer (2015)
Azab, M., Eltoweissy, M.: Chameleonsoft: software behavior encryption for moving target defense. Mobile Netw. Appl. 18(2), 271–292 (2013)
Azab, M., Eltoweissy, M.: Migrate: towards a lightweight moving-target defense against cloud side-channels. In: IEEE Security and Privacy Workshops (SPW), 2016, pp. 96–103. IEEE, Washington DC (2016)
Beloglazov, A., Piraghaj, S.F., Alrokayan, M., Buyya, R.: Deploying openstack on centos using the KVM hypervisor and GlusterFS distributed file system. University of Melbourne (2012)
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)
Cai, G., Wang, B., Wei, H., Wang, T.: Moving target defense: state of the art and characteristics. Front. Inf. Technol. Electron. Eng. 17(11), 1122–1153 (2016)
Chiueh, S.N.T.C., Brook, S.: A survey on virtualization technologies. RPE Report pp. 1–42 (2005)
Evans, D., Nguyen-Tuong, A., Knight, J.: Effectiveness of moving target defenses. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense, pp. 29–48. Springer, Heidelberg (2011)
Expósito, R.R., Taboada, G.L., Ramos, S., TouriñO, J., Doallo, R.: Performance analysis of HPC applications in the cloud. Future Gen. Comput. Syst. 29(1), 218–229 (2013)
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 120–128. IEEE Computer Society Press, Los Alamitos (1996)
Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 5 (2013)
Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J., Almorsy, M.: Cloudsec: a security monitoring appliance for virtual machines in the IAAS cloud model. In: Proceedings of the 5th International Conference on Network and System Security (NSS) 2011, pp. 113–120. IEEE, Piscataway (2011)
Kaur, P., Rani, A.: Virtual machine migration in cloud computing. Int. J. Grid Distrib. Comput. 8(5), 337–342 (2015)
Khorshed, M.T., Ali, A.S., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)
Kim, T., Peinado, M., Mainar-Ruiz, G.: Stealthmem: system-level protection against cache-based side channel attacks in the cloud. In: USENIX Security symposium, pp. 189–204 (2012)
Lee, W., Stolfo, S.J., et al.: Data mining approaches for intrusion detection. In: USENIX Security Symposium, pp. 79–93. San Antonio, TX (1998)
Mell, P., Grance, T.: A NIST definition of cloud computing. National Institute of Standards and Technology (NIST) Special Publication 800-145 (2009)
Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63(2), 561–592 (2013)
Moon, S.J., Sekar, V., Reiter, M.K.: Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1595–1606. ACM, New York (2015)
Murtaza, S.S., Khreich, W., Hamou-Lhadj, A., Couture, M.: A host-based anomaly detection approach by representing system calls as states of kernel modules. In: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp. 431–440. IEEE Computer Society, Los Alamitos (2013)
Okhravi, H., Comella, A., Robinson, E., Haines, J.: Creating a cyber moving target for critical infrastructure applications using platform diversity. Int. J. Crit. Infrastruct. Prot. 5(1), 30–39 (2012)
Satsuma, J., Willox, R., Ramani, A., Grammaticos, B., Carstea, A.: Extending the sir epidemic model. Physica A 336(3), 369–375 (2004)
Theoharidou, M., Papanikolaou, N., Pearson, S., Gritzalis, D.: Privacy risk, security, accountability in the cloud. In: 2013 IEEE 5th International Conference on, Cloud Computing Technology and Science (CloudCom), vol. 1, pp. 177–184. IEEE, Washington, DC (2013)
Zhang, Y., Reiter, M.K.: Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 827–838. ACM, New York (2013)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kashkoush, M.S., Azab, M., Attiya, G. et al. Online Smart Disguise: real-time diversification evading coresidency-based cloud attacks. Cluster Comput 22, 721–736 (2019). https://doi.org/10.1007/s10586-018-2851-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2851-2