Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3090354.3090405acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdcaConference Proceedingsconference-collections
research-article

Mobiles Agents and Virtual Firewall to Secure the Shared Network for Virtual Machines in IaaS cloud

Published: 29 March 2017 Publication History

Abstract

Cloud computing is a new paradigm based on distributed services. It allows to reduce costs and simplify the management of resources. Positioning the cloud in an operational environment provides easy and quick access to computing resources anywhere, anytime, with any device. However, it is deployed in virtual resources to provide services to public customers and private organizations. In fact, without security measures, distributed cloud services are vulnerable. It acquires knowledge about vulnerabilities, attacks, activities of attackers and tools to secure it. In this paper, we will propose a framework for detecting and repairing distributed intrusions in private cloud. However, we focus on the security of virtual network in virtualized environment. In order to secure inside or outside communication of virtual machines, we suggest using our framework based on snort, mobile agents and virtual firewall. This framework allows to reach three objectives: the first, detection intrusion in a virtual environment using mobile agents for collecting malicious data. The second, generating new signatures from malicious data, which were collected in the first phase. Finally, dynamic deployment of remote response actions using virtual firewall. By this type of close-loop control, the collaborative network security management framework can identify and address new distributed attacks more quickly and effectively.

References

[1]
M. Firdhous, O. Ghazali and H. Suhaidi. "Trust Management in Cloud Computing: A Critical Review" International Journal on Advances in ICT for Emerging Regions, 2011.
[2]
H. Wu, Y. Ding, C. Winer, and L. Yao, "Network security for virtual machine in cloud computing", 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), Seoul, pp. 18--21, 2010.
[3]
N. Modi et all "Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review", The Journal of Supercomputing,. 2016.
[4]
J. D. Araújoet et all, "EICIDS-elastic and internal cloud-based detection system", International Journal of Communication Networks and Information Security (IJCNIS), 2015.
[5]
Hai J, Guofu Xet all, AVMM-based intrusion prevention system in cloud computing environment. J Supercomput Springer Sci, 2013.
[6]
Vieira K, Schulter A, Westphall C, Westphall C, Intrusion detection techniques in grid and cloud computing environment. IEEE, 2010.
[7]
Zayed Al Haddad, Mostafa Hanoune and Abdelaziz Mamouni. "A Collaborative Network Intrusion Detection System (C-NIDS) in Cloud Computing", International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8, No. 3, December 2016
[8]
Toumi, H., B. Marzak, A. Talea, A. Eddaoui, and M. Talea. "Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment", International Journal of Interactive Multimedia and Artificial Intelligence, Vol. 4, 2017
[9]
H. Toumi, A. Talea, B. Marzak, A. Eddaoui, M. Talea, "Cooperative Trust Framework for Cloud Computing Based on Mobile Agents". International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7, No. 2, August 2015
[10]
H. Toumi, A. Eddaoui and M. Talea." Cooperative Intrusion Detection System Framework Using Mobile Agents for Cloud Computing". Journal of Theoretical and Applied Information Technology 10th December 2014. Vol.70 No.1
[11]
Kaaviyan Kanagasabapathi, S. Deepak and P. Prakash. "A Study on Security Issues in Cloud Computing", Springer India 2016.
[12]
Keiko H, DavidGR, Eduardo FM, Eduardo BF. An analysis of security issues for cloud computing. J Internet Serv Appl, 2013.
[13]
H. Toumi, M. Talea, K. Sabiri, A. Eddaoui. "Toward a trusted framework for cloud computing", International Conference on Cloud Computing Technologies and Applications CLOUDTECH, IEEE, 2015.
[14]
N. Afzali Seresht, R. Azmi. "MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach". Engineering Applications of Artificial Intelligence 35, 2014.
[15]
Fahad F. Alruwaili and T. Aaron Gulliver. "CCIPS: A Cooperative Intrusion Detection and Prevention Framework for Cloud Services", Int. J Latest Trends Computing, December 2013.
[16]
Amirreza Zarrabi and Alireza Zarrabi, "Internet Intrusion Detection System Service in a Cloud". International Journal of Computer Science Issues, September 2012.
[17]
Paweł Lubomski, Andrzej Kalinowski, Henryk Krawczyk. "Multi-level Virtualization and Its Impact on System Performance in Cloud Computing". Proceedings, 23rd International Conference, CN 2016, Brunów, Poland, Springer, June 14--17, 2016, Switzerland.
[18]
Kamaruzaman Maskat, Mohd Afizi Mohd Shukran, Mohammad Adib Khairuddin. "Using Agent Based SNORT in Intrusion Detection Systems", International Conference on Industrial and Intelligent Information (ICIII 2012) IPCSIT vol.31, 2012
[19]
Youssef Mifrah, Abdeslam En-Nouaary, Mohamed Dahchour. "An Abstract Framework for Introducing Computational Trust Models in JADE-Based Multi-Agent Systems", Advances in Ubiquitous Networking, Springer, 2016
[20]
Sho Oishi, Naoki Fukuta. "A Cooperative Task Execution Mechanism for Personal Assistant Agents Using Ability Ontology", 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI), IEEE, 2017
[21]
AfnanFahim, AbderrahmenMtibaa, and Khaled A. Harras," Making the Case For Computational Offloadingin Mobile Device Clouds", June 2013.
[22]
David I. Fadaraliki, S. Rajendran. "Process Offloading from Android Device to Cloud Using JADE", International Conference on Circuit, Power and Computing Technologies, 2015.
[23]
Jaydip Sen. "A Distributed Intrusion Detection System Using Cooperating Agents", In Proceedings of the 3rd International Conference on Information Processing (ICIP'09), August 7-9, Bangalore, 2009, pp. 559--568.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications
March 2017
685 pages
ISBN:9781450348522
DOI:10.1145/3090354
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Ministère de I'enseignement supérieur: Ministère de I'enseignement supérieur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Mobile Agent
  2. Snort
  3. Virtual Firewall
  4. Vulnerability

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

BDCA'17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 89
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media