The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

Conference item


Pitropakis, N, Lyvas, C and Lambrinoudakis, C (2017). The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization. Athens 19 - 21 Feb 2017 London South Bank University.
AuthorsPitropakis, N, Lyvas, C and Lambrinoudakis, C
Abstract

The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their quest came to end with the birth of Cloud Computing infrastructures. However, along with the new promising technology, new attack vectors were born, and one old and known threat, that of Malicious Insiders reappeared. Insiders can use their privileged position inside the Cloud infrastructure to accomplish or help in attacks against a Cloud infrastructure. In this paper, we propose a practical and efficient intrusion detection system solution for Cloud infrastructures based on Graphical Processing Unit (GPU) acceleration. Our solution monitors the deployed virtual machines operations and especially those of the host Operating System’s, known as Dom0, correlating the collected information to detect uncommon behavior based on the SmithWaterman algorithm. Our proposal makes possible the cooperation of a variety of known hypervisors along with every known GPU acceleration unit used, thus offering the maximum of security mechanics while at the same time minimizing the imposed overhead in terms of Central Processing Unit (CPU) usage.

Keywordss-Cloud Computing; Security; Malicious Insider; IDS; GPU; Acceleration
Year2017
PublisherLondon South Bank University
Accepted author manuscript
License
CC BY 4.0
Publication dates
Print19 Feb 2017
Publication process dates
Deposited23 Feb 2018
Accepted10 Feb 2017
Permalink -

https://openresearch.lsbu.ac.uk/item/87067

  • 6
    total views
  • 3
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Related outputs

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Kintis, P, Miramirkhani, N, Lever, C, Chen, Y, Romero-Gómez, R, Pitropakis, N, Nikiforakis, N and Antonakakis, M (2017). Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. Association of Computer Machinery's Computer and Communications Security (ACM CCS) 2017. Dallas, Texas USA 30 Oct - 02 Nov 2017 London South Bank University. doi:10.1145/3133956.3134002
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture.
Chrysoulas, C and Pitropakis, N (2018). Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. 4, pp. e4-e4.
The far side of mobile application integrated development environments
Lyvas, C, Pitropakis, N and Lambrinoudakis, C (2016). The far side of mobile application integrated development environments. 13th International Conference Trust, Privacy and Security in Digital Business. Porto, Portugal 07 - 08 Sep 2016 London South Bank University. doi:10.1007/978-3-319-44341-6_8