Misuse detection in a simulated IaaS environment

Document Type

Journal Article

Publication Title

International Workshop on Emerging Technologies for Authorization and Authentication

Publisher

Springer Nature

School

Security Research Institute

RAS ID

27276

Comments

Al-Bayati, B., Clarke, N., Dowland, P., & Li, P. (2018). Misuse detection in a simulated IaaS environment. In International Workshop on Emerging Technologies for Authorization and Authentication (pp. 103-115).

Available here.

Abstract

Cloud computing is an emerging technology paradigm by offering elastic computing resources for individuals and organisations with low cost. However, security is still the most sensitive issue in cloud computing services as the service remains accessible to anyone after initial simple authentication login for significant periods. This has led to increase vulnerability to potential attacks and sensitive customer information being misused. To be able to detect this misuse, an additional intelligent security measures are arguably required. Tracking user’s activity by building user behaviour profiles is one technique that has been successfully applied in a variety of applications such as telecommunication misuse and credit card fraud. This paper presents an investigation into applying behavioural profiling in a simulated IaaS-based infrastructure for the purposes of misuse detection by verifying the active user continuously and transparently. In order to examine the feasibility of this approach within cloud infrastructure services, a private dataset was collected containing real interactions of 60 users over a three-week period (totalling 1,048,195 log entries). A series of experiments were conducted using supervised machine learning algorithms to examine the ability of detecting abnormal usage. The best experimental result of 0.32% Equal Error Rate is encouraging and indicates the ability of identifying misuse within cloud computing services via the behavioural profiling technique.

DOI

10.1007/978-3-030-04372-8_9

Access Rights

subscription content

Share

 
COinS