T-Grid: A Domain based Trusted Grid Model with Purging ofUntrustworthy Transactions
WEIJIE LIU,YONGJUN ZHU,WOOJU KIM,HAKJIN KIM,P. SURESH KUMAR,Dimitrios Damopoulos,Georgios Kambourakis,Marios Anagnostopoulos,Yuan Tian,Biao Song,Eui-nam Huh,Wei Tang,Doan Man Nguyen,Jun Young Park,Sang Ho Na,Tian yiμan,Eui-Nam Huh,Bofeng Zhang,Jianxing Zheng,Jianhua Ma,Yinsheng Li,Guobing Zou,Jongik Kim,Eunseok Lee,Yun Won Chung,Byoungwook Kim,HeonChang Yu,EunYoung Lee,Rize Jin,Tae-Sun Chung,Tien Dung,Eui Nam,NGUYEN DOAN MAN,JUN-YOUNG PARK,NA SANG-HO,TIAN YUAN
2012-01-01
Abstract:Intrusion Detection Systems (lDSs), nowadays, critically becomes an important security component in the novel commercial computing models to detect malicious behaviors timely and protect either network infrastructure or individual hosts from the serious damage of attacks. For Cloud Computing, various application scenarios and complexity at a higher level make the traditional IDS approaches difficult to find out the actual threats from the novel multi-step attacks, which stem from the new vulnerabilities of Cloud environments. Therefore, information about novel attack scenarios is an urgent requirement to operate IDSs built in Cloud Computing more efficiently and accurately. This paper focuses on developing a data mining-based approach to construct new attack scenarios from the sequences of low-level alerts gathered from multiple traditional IDSs. In addition, an Attack Signature Exchange (ASE) model between Interconnect Clouds in a Collaborative Cloud Computing environment which is considered as a prior knowledge exchange is also presented. Key-words: Intrusion Detection System, Cloud Computing, Attack scenario, Attack Signature, Collaborative Cloud