SlideShare a Scribd company logo
1 of 33
CLOUD-BASED IDS
ARCHITECTURES
APPLYING THE IDS APPROACHES
INTO THE CLOUD ENVIRONMENT

@halloussi

Par M. EL ALLOUSSI
Summary
1.

2.

3.
4.

5.

Cloud Computing : Definition and
Trends
Security in the Cloud Computing :
Barriers to adoption?
Intrusion Detection Systems
Application of IDS in Cloud
Environment
Conclusion
Definition of Cloud Computing (NIST)

“Cloud computing is a model for enabling
convenient, on-demand network access
to a shared pool of configurable
computing resources
that can be rapidly provisioned and
released with minimal management effort
or service provider interaction. “
5 Essential Cloud Characteristics
1.
2.
3.

On-demand self-service
Broad network access
Resource pooling (Location

independence)
4.

5.

Rapid elasticity
Measured service
3 Cloud Service Models
1.

Cloud Software as a Service (SaaS)


2.

Cloud Platform as a Service (PaaS)


3.

Use provider’s applications over a network
Deploy customer-created applications to a cloud

Cloud Infrastructure as a Service (IaaS)


Rent processing, storage, network capacity, and other
fundamental computing resources
4 Cloud Deployment Models
Private cloud
Enterprise owned or leased

Community cloud
Shared infrastructure for specific community

Public cloud
Sold to the public, mega-scale infrastructure

Hybrid cloud
Composition of two or more clouds
All of this TOGETHER: The
Cloud
Hybrid Clouds
Deployment
Models
Service
Models

Community
Cloud

Private
Cloud
Software as a
Service (SaaS)

Public Cloud

Platform as a
Service (PaaS)

Infrastructure as a
Service (IaaS)

On Demand Self-Service
Essential
Characteristics

Rapid Elasticity

Resource Pooling

Measured Service

Massive Scale
Common
Characteristics

Broad Network Access

Resilient Computing

Homogeneity

Geographic Distribution

Virtualization

Service Orientation

Low Cost Software

Advanced Security
And security?

Are there Cloud security issues?
Security: Barrier to Adoption?
Companies are still afraid to use
clouds
12

What is Different about Cloud?
13

What is Different about Cloud?

SERVICE OWNER

SaaS

PaaS

IaaS

Data

Joint

Tenant

Tenant

Application

Joint

Joint

Tenant

Compute

Provider

Joint

Tenant

Storage

Provider

Provider

Joint

Network

Provider

Provider

Joint

Physical

Provider

Provider

Provider
Traditional systems security
vs Cloud Computing Security

Securing a house
Biggest user
concerns
Securing perimeter
Checking for
intruders

Securing a motel
Biggest user
concern
Securing room
against (the bad guy
in next room | hotel
15
Cloud “Threats” (CSA)
1.

2.
3.
4.
5.
6.

7.

Abuse & Nefarious Use of Cloud
Computing
Insecure Interfaces & APIs
Malicious Insiders
Shared Technology Issues
Data Loss or Leakage
Account or Service Hijacking
Unknown Risk Profile

16
17

Cloud Risks (ENISA)
1.
2.
3.
4.
5.
6.
7.
8.

Loss of governance
Lock-in
Isolation failure
Compliance risks
Management interface compromise
Data protection
Insecure or incomplete data deletion
Malicious insider
Who is the attacker?
Insider?
• Malicious employees at client
• Malicious employees at Cloud provider (or
Cloud provider itself)

Outsider?
•Intruders
•Network attackers
Intrusion Detection Systems?
IDS OVERVIEW




Intrusion Detection System (IDS) : a system that
monitors network for suspicious activity and alerts
the administrator of the system or network.
3 Approaches :
 Network

Intrusion Detection Systems (NIDS)
 Host Intrusion Detection Systems (HIDS)
 Virtual Machine Intrusion Detection Systems (VM-IDS)


2 techniques :
 Statistical

anomaly based (Behavioral)
 Signature based (Scenario)
Architecture of an IDS
Normal internal user
Internal Intruder

Sensor

Classification
Package Actions

Analyser
Clustering

Normal External user
External user

Sensor
Data Mining







The sensor : collects information on the evolution of the state of the
system and provides a sequence of events that reflect this evolution.
The analyzer : determines which part, fitting to a pattern of events
provided by the sensor, is characteristic of a malicious activity.
The manager : collects the received alerts from the sensor and
presents them to the operator for further actions.
The IDS Matrix diagram
TRUE

FALSE

POSITIVE

True-Positive
(Rule matched and attack present)

False-Positive
(Rule matched and no attack
present)

NEGATIVE

True-Negative
(No rule matched and no attack
present)

False-Negative
(No rule matched and attack
present)
Behavioral approach
+++ The ability to detect new attacks.

Types of monitoring
systems

Host Based
IDS

Analysis types

Network
Based IDS

Scenario
approach

Phase 1 : Training

Behavior
approach

Phase 2 : détection

Real
Activities

Compared
Model of normal behavior
(Trafic, System performance,
memory performance…)

--- Many false positives because attacks
can be new normal activities.

Normal
behavior

Undeflected

Defleclected

Possible attack
Scenario approach
+++ Techniques are easy and quick to
implement.
Types of monitoring
systems

Host Based
IDS

Analysis types

Network
Based IDS

Scenario
approach

Behavior
approach

Ex: if (src_ip = dst_ip)
then “land a ack”

Real Activities

Signatures (rules,
patterns) known
attacks

--- Problem of reliability remains valid
for false alarms

Normal

Not matched

Matched

attack
Intrusion Detection Systems in the
Cloud, is it possible?
Architecture 1 : Distributed the IDS
on the nodes of grid

+++ Apply the two methods
of intrusion detection
(Scenario Based &
Behavioral Based)

--- The prototype is
expensive in terms of
resource consumption,
--- It cannot discover new
types of attacks and
creating an attack database
which must be considered
during implementing IDS
Architecture 2 : Distributed Cloud
Intrusion Detection Model
+++ high performance in terms of processing and execution
time.

CSP Infrastructure

Cloud User
Organization

Network Cloud

Cloud IDS
Intrusion
Alarm
Alert
reports

--- it is difficult to discover new types
of attacks and create a new scenario
while it still needs many works to be
done to improve the concept.

Advisory
Reports

Third party IDS monitoring &
Advisory Service
Architecture 2 : Distributed Cloud
Intrusion Detection Model
Input Packets

ICMP

IP

UDP

Multi-Threaded Queue
Thread 0 - n

TCP

Rule Set Matching

False

Reject

True
IDS Rule Set

Intrusion alarm/ Log

Cloud User

CSP
Architecture 3 : Cloud Intrusion
Detection System Service
Collector
Event Publisher

IDS Controller

Detection Engine

Intrusion Detection System Component
Cloud Computer Service
Component

+++ Quick and fast
analyse and detection

Cloud Computer Service
Component

Secure Connection (VPN)

Agent
Agent Group

Agent
Agent Group

User Internal Network

--- detecting many falsepositive
Architecture 4 : Cloud-based
intrusion detection service
framework (CBIDS)
Cloud IDS

Cloud Intrusion Detection Component
Analysis Engine

Service Console

Detection Engine /
Signature Database

User database

Cloud Service Component

Cloud Service Component

VPN
Users Cloud
User Data Collector

User Network

--- detecting many falsepositive
Architecture 5 : VM-integrated IDS
Management
+++ Can be implemented
on the three levels

--- The use of centralized
collector can be a target
of Denial of Service.
Architecture 5 : VM-integrated IDS
Management
Conclusions
Many IDS solutions have emerged for Cloud
environment
 It could be implemented either by the
provider or the tenant
 Combining Behavior and Scenario
approaches is the best way to get rid of
intrusion.

Questions?

THANK
YOU
@halloussi
fr.slideshare.net/alloussi

More Related Content

What's hot

Policies to mitigate cyber risk
Policies to mitigate cyber riskPolicies to mitigate cyber risk
Policies to mitigate cyber riskG Prachi
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Rishabh Upadhyay
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsPeter Rawsthorne
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
Adversary Emulation using CALDERA
Adversary Emulation using CALDERAAdversary Emulation using CALDERA
Adversary Emulation using CALDERAErik Van Buggenhout
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpickidsecconf
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsSergey Soldatov
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysisBikrant Gautam
 
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Digit Oktavianto
 

What's hot (20)

Policies to mitigate cyber risk
Policies to mitigate cyber riskPolicies to mitigate cyber risk
Policies to mitigate cyber risk
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
Adversary Emulation using CALDERA
Adversary Emulation using CALDERAAdversary Emulation using CALDERA
Adversary Emulation using CALDERA
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Incident response process
Incident response processIncident response process
Incident response process
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
 

Viewers also liked

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001eaiti
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Managing Cloud Security: Intrusion Detection Services in a Public Cloud
Managing Cloud Security: Intrusion Detection Services in a Public CloudManaging Cloud Security: Intrusion Detection Services in a Public Cloud
Managing Cloud Security: Intrusion Detection Services in a Public CloudRightScale
 
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud 3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud Threat Stack
 
Secerno SQLagile datasheet
Secerno SQLagile datasheetSecerno SQLagile datasheet
Secerno SQLagile datasheetPaul Tompsett
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Hassan EL ALLOUSSI
 
개발자도 알아야 하는 DBMS튜닝
개발자도 알아야 하는 DBMS튜닝개발자도 알아야 하는 DBMS튜닝
개발자도 알아야 하는 DBMS튜닝정해 이
 
(SQL초보자를 위한, 쿼리최적화 for SQL튜닝)SQL쿼리작성Tip,최적화팁,최적화된SQL작성방법교육
(SQL초보자를 위한, 쿼리최적화 for SQL튜닝)SQL쿼리작성Tip,최적화팁,최적화된SQL작성방법교육(SQL초보자를 위한, 쿼리최적화 for SQL튜닝)SQL쿼리작성Tip,최적화팁,최적화된SQL작성방법교육
(SQL초보자를 위한, 쿼리최적화 for SQL튜닝)SQL쿼리작성Tip,최적화팁,최적화된SQL작성방법교육탑크리에듀(구로디지털단지역3번출구 2분거리)
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection amiable_indian
 
4 contre-mesures pour renforcer la sécurité de son application web coté client
4 contre-mesures pour renforcer la sécurité de son application web coté client4 contre-mesures pour renforcer la sécurité de son application web coté client
4 contre-mesures pour renforcer la sécurité de son application web coté clientMohammed CHERIFI
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
svn 능력자를 위한 git 개념 가이드
svn 능력자를 위한 git 개념 가이드svn 능력자를 위한 git 개념 가이드
svn 능력자를 위한 git 개념 가이드Insub Lee
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!
도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!
도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!pyrasis
 

Viewers also liked (20)

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Managing Cloud Security: Intrusion Detection Services in a Public Cloud
Managing Cloud Security: Intrusion Detection Services in a Public CloudManaging Cloud Security: Intrusion Detection Services in a Public Cloud
Managing Cloud Security: Intrusion Detection Services in a Public Cloud
 
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud 3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
 
public cloud security via ids
public cloud security via idspublic cloud security via ids
public cloud security via ids
 
DM for IDS
DM for IDSDM for IDS
DM for IDS
 
Secerno SQLagile datasheet
Secerno SQLagile datasheetSecerno SQLagile datasheet
Secerno SQLagile datasheet
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
개발자도 알아야 하는 DBMS튜닝
개발자도 알아야 하는 DBMS튜닝개발자도 알아야 하는 DBMS튜닝
개발자도 알아야 하는 DBMS튜닝
 
(SQL초보자를 위한, 쿼리최적화 for SQL튜닝)SQL쿼리작성Tip,최적화팁,최적화된SQL작성방법교육
(SQL초보자를 위한, 쿼리최적화 for SQL튜닝)SQL쿼리작성Tip,최적화팁,최적화된SQL작성방법교육(SQL초보자를 위한, 쿼리최적화 for SQL튜닝)SQL쿼리작성Tip,최적화팁,최적화된SQL작성방법교육
(SQL초보자를 위한, 쿼리최적화 for SQL튜닝)SQL쿼리작성Tip,최적화팁,최적화된SQL작성방법교육
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
4 contre-mesures pour renforcer la sécurité de son application web coté client
4 contre-mesures pour renforcer la sécurité de son application web coté client4 contre-mesures pour renforcer la sécurité de son application web coté client
4 contre-mesures pour renforcer la sécurité de son application web coté client
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
svn 능력자를 위한 git 개념 가이드
svn 능력자를 위한 git 개념 가이드svn 능력자를 위한 git 개념 가이드
svn 능력자를 위한 git 개념 가이드
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Ns2
Ns2Ns2
Ns2
 
도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!
도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!
도커 무작정 따라하기: 도커가 처음인 사람도 60분이면 웹 서버를 올릴 수 있습니다!
 

Similar to Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD ENVIRONMENT

A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019ijsrd.com
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesMatteo Leonetti
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique IRJET Journal
 
original research papers
original research papersoriginal research papers
original research papersrikaseorika
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
 
Database security project-presentation-2-v1
Database security project-presentation-2-v1Database security project-presentation-2-v1
Database security project-presentation-2-v1galibhussain
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
IDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdfIDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdfmckenziecast21211
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD ENVIRONMENT (20)

012
012012
012
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019
 
Vertualisation
VertualisationVertualisation
Vertualisation
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing Services
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
original research papers
original research papersoriginal research papers
original research papers
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
Database security project-presentation-2-v1
Database security project-presentation-2-v1Database security project-presentation-2-v1
Database security project-presentation-2-v1
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
IDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdfIDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdf
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

More from Hassan EL ALLOUSSI

Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudHassan EL ALLOUSSI
 
PCI-DSS COMPLIANCE ON THE CLOUD
PCI-DSS COMPLIANCE ON THE CLOUDPCI-DSS COMPLIANCE ON THE CLOUD
PCI-DSS COMPLIANCE ON THE CLOUDHassan EL ALLOUSSI
 
Introduction à la certification itil foundation
Introduction à la certification itil foundationIntroduction à la certification itil foundation
Introduction à la certification itil foundationHassan EL ALLOUSSI
 
Pmp : management des parties prenantes
Pmp : management des parties prenantesPmp : management des parties prenantes
Pmp : management des parties prenantesHassan EL ALLOUSSI
 
Evaluation financiere de projet
Evaluation financiere de projetEvaluation financiere de projet
Evaluation financiere de projetHassan EL ALLOUSSI
 
Introduction à la conduite de projet
Introduction à la conduite de projetIntroduction à la conduite de projet
Introduction à la conduite de projetHassan EL ALLOUSSI
 

More from Hassan EL ALLOUSSI (7)

Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
 
PCI-DSS COMPLIANCE ON THE CLOUD
PCI-DSS COMPLIANCE ON THE CLOUDPCI-DSS COMPLIANCE ON THE CLOUD
PCI-DSS COMPLIANCE ON THE CLOUD
 
Sécurité dans le cloud
Sécurité dans le cloudSécurité dans le cloud
Sécurité dans le cloud
 
Introduction à la certification itil foundation
Introduction à la certification itil foundationIntroduction à la certification itil foundation
Introduction à la certification itil foundation
 
Pmp : management des parties prenantes
Pmp : management des parties prenantesPmp : management des parties prenantes
Pmp : management des parties prenantes
 
Evaluation financiere de projet
Evaluation financiere de projetEvaluation financiere de projet
Evaluation financiere de projet
 
Introduction à la conduite de projet
Introduction à la conduite de projetIntroduction à la conduite de projet
Introduction à la conduite de projet
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD ENVIRONMENT

  • 1. CLOUD-BASED IDS ARCHITECTURES APPLYING THE IDS APPROACHES INTO THE CLOUD ENVIRONMENT @halloussi Par M. EL ALLOUSSI
  • 2. Summary 1. 2. 3. 4. 5. Cloud Computing : Definition and Trends Security in the Cloud Computing : Barriers to adoption? Intrusion Detection Systems Application of IDS in Cloud Environment Conclusion
  • 3. Definition of Cloud Computing (NIST) “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. “
  • 4. 5 Essential Cloud Characteristics 1. 2. 3. On-demand self-service Broad network access Resource pooling (Location independence) 4. 5. Rapid elasticity Measured service
  • 5. 3 Cloud Service Models 1. Cloud Software as a Service (SaaS)  2. Cloud Platform as a Service (PaaS)  3. Use provider’s applications over a network Deploy customer-created applications to a cloud Cloud Infrastructure as a Service (IaaS)  Rent processing, storage, network capacity, and other fundamental computing resources
  • 6. 4 Cloud Deployment Models Private cloud Enterprise owned or leased Community cloud Shared infrastructure for specific community Public cloud Sold to the public, mega-scale infrastructure Hybrid cloud Composition of two or more clouds
  • 7. All of this TOGETHER: The Cloud Hybrid Clouds Deployment Models Service Models Community Cloud Private Cloud Software as a Service (SaaS) Public Cloud Platform as a Service (PaaS) Infrastructure as a Service (IaaS) On Demand Self-Service Essential Characteristics Rapid Elasticity Resource Pooling Measured Service Massive Scale Common Characteristics Broad Network Access Resilient Computing Homogeneity Geographic Distribution Virtualization Service Orientation Low Cost Software Advanced Security
  • 8. And security? Are there Cloud security issues?
  • 10. Companies are still afraid to use clouds
  • 11. 12 What is Different about Cloud?
  • 12. 13 What is Different about Cloud? SERVICE OWNER SaaS PaaS IaaS Data Joint Tenant Tenant Application Joint Joint Tenant Compute Provider Joint Tenant Storage Provider Provider Joint Network Provider Provider Joint Physical Provider Provider Provider
  • 13. Traditional systems security vs Cloud Computing Security Securing a house Biggest user concerns Securing perimeter Checking for intruders Securing a motel Biggest user concern Securing room against (the bad guy in next room | hotel
  • 14. 15
  • 15. Cloud “Threats” (CSA) 1. 2. 3. 4. 5. 6. 7. Abuse & Nefarious Use of Cloud Computing Insecure Interfaces & APIs Malicious Insiders Shared Technology Issues Data Loss or Leakage Account or Service Hijacking Unknown Risk Profile 16
  • 16. 17 Cloud Risks (ENISA) 1. 2. 3. 4. 5. 6. 7. 8. Loss of governance Lock-in Isolation failure Compliance risks Management interface compromise Data protection Insecure or incomplete data deletion Malicious insider
  • 17. Who is the attacker? Insider? • Malicious employees at client • Malicious employees at Cloud provider (or Cloud provider itself) Outsider? •Intruders •Network attackers
  • 19. IDS OVERVIEW   Intrusion Detection System (IDS) : a system that monitors network for suspicious activity and alerts the administrator of the system or network. 3 Approaches :  Network Intrusion Detection Systems (NIDS)  Host Intrusion Detection Systems (HIDS)  Virtual Machine Intrusion Detection Systems (VM-IDS)  2 techniques :  Statistical anomaly based (Behavioral)  Signature based (Scenario)
  • 20. Architecture of an IDS Normal internal user Internal Intruder Sensor Classification Package Actions Analyser Clustering Normal External user External user Sensor Data Mining    The sensor : collects information on the evolution of the state of the system and provides a sequence of events that reflect this evolution. The analyzer : determines which part, fitting to a pattern of events provided by the sensor, is characteristic of a malicious activity. The manager : collects the received alerts from the sensor and presents them to the operator for further actions.
  • 21. The IDS Matrix diagram TRUE FALSE POSITIVE True-Positive (Rule matched and attack present) False-Positive (Rule matched and no attack present) NEGATIVE True-Negative (No rule matched and no attack present) False-Negative (No rule matched and attack present)
  • 22. Behavioral approach +++ The ability to detect new attacks. Types of monitoring systems Host Based IDS Analysis types Network Based IDS Scenario approach Phase 1 : Training Behavior approach Phase 2 : détection Real Activities Compared Model of normal behavior (Trafic, System performance, memory performance…) --- Many false positives because attacks can be new normal activities. Normal behavior Undeflected Defleclected Possible attack
  • 23. Scenario approach +++ Techniques are easy and quick to implement. Types of monitoring systems Host Based IDS Analysis types Network Based IDS Scenario approach Behavior approach Ex: if (src_ip = dst_ip) then “land a ack” Real Activities Signatures (rules, patterns) known attacks --- Problem of reliability remains valid for false alarms Normal Not matched Matched attack
  • 24. Intrusion Detection Systems in the Cloud, is it possible?
  • 25. Architecture 1 : Distributed the IDS on the nodes of grid +++ Apply the two methods of intrusion detection (Scenario Based & Behavioral Based) --- The prototype is expensive in terms of resource consumption, --- It cannot discover new types of attacks and creating an attack database which must be considered during implementing IDS
  • 26. Architecture 2 : Distributed Cloud Intrusion Detection Model +++ high performance in terms of processing and execution time. CSP Infrastructure Cloud User Organization Network Cloud Cloud IDS Intrusion Alarm Alert reports --- it is difficult to discover new types of attacks and create a new scenario while it still needs many works to be done to improve the concept. Advisory Reports Third party IDS monitoring & Advisory Service
  • 27. Architecture 2 : Distributed Cloud Intrusion Detection Model Input Packets ICMP IP UDP Multi-Threaded Queue Thread 0 - n TCP Rule Set Matching False Reject True IDS Rule Set Intrusion alarm/ Log Cloud User CSP
  • 28. Architecture 3 : Cloud Intrusion Detection System Service Collector Event Publisher IDS Controller Detection Engine Intrusion Detection System Component Cloud Computer Service Component +++ Quick and fast analyse and detection Cloud Computer Service Component Secure Connection (VPN) Agent Agent Group Agent Agent Group User Internal Network --- detecting many falsepositive
  • 29. Architecture 4 : Cloud-based intrusion detection service framework (CBIDS) Cloud IDS Cloud Intrusion Detection Component Analysis Engine Service Console Detection Engine / Signature Database User database Cloud Service Component Cloud Service Component VPN Users Cloud User Data Collector User Network --- detecting many falsepositive
  • 30. Architecture 5 : VM-integrated IDS Management +++ Can be implemented on the three levels --- The use of centralized collector can be a target of Denial of Service.
  • 31. Architecture 5 : VM-integrated IDS Management
  • 32. Conclusions Many IDS solutions have emerged for Cloud environment  It could be implemented either by the provider or the tenant  Combining Behavior and Scenario approaches is the best way to get rid of intrusion. 

Editor's Notes

  1. This is an oversimplification of the cloud security issues but it is definitely correct on a high level: there is only so much you can do to improve security if you use a software as a service provider (SaaS), who is hell bent on not being supportive of your security requirements
  2. Source: CSA standard slideThis is where the mysteries of PCI in the cloud start to come to life : Especially note those yellow boxes with the word JOINT (which, sadly, often means finger pointing and glaring security holes)Also, note that for cloud security (and for cloud Payment security as well as PCI ) you will have to trust the provider in regards to physical security.
  3. It is funny that this view of the world and of the cloud also has a hidden implication : if you neighbor is hacked in a traditional environment , you have a perfectly good grounds for saying “I don’t care.” But in case of shared infrastructure – cloud! – Being able to say that because more and more rare – or more and more risky.
  4. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdfThe purpose of this document, “Top Threats to Cloud Computing”, is to provide needed context to assist organizations in making educated risk management decisions regarding their cloud adoption strategies. In essence, this threat research document should be seen as a companion to “Security Guidance for Critical Areas in Cloud Computing”. As the first deliverable in the CSA’s Cloud Threat Initiative, the “Top Threats” document will be updated regularly to reflect expert consensus on the probable threats which customers should be concerned about. There has been much debate about what is “in scope” for this research. We expect this debate to continue and for future versions of “Top Threats to Cloud Computing” to reflect the consensus emerging from those debates. While many issues, such as provider financial stability, create significant risks to customers, we have tried to focus on issues we feel are either unique to or greatly amplified by the key characteristics of Cloud Computing and its shared, on-demand nature. We identify the following threats in our initial document: Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss/Leakage Account, Service & Traffic Hijacking Unknown Risk ProfileThe threats are not listed in any order of severity. Our advisory committee did evaluate the threats and each committee member provided a subjective ranking of the threats. The exercise helped validate that our threat listing reflected the critical threat concerns of the industry, however the cumulative ranking did not create a compelling case for a published ordered ranking, and it is our feeling that greater industry participation is required to take this step. The only threat receiving a consistently lower ranking was Unknown Risk Profile, however the commentary indicated that this is an important issue that is simply more difficult to articulate, so we decided to retain this threat and seek to further clarify it in future editions of the report
  5. LOSS OF GOVERNANCE: in using cloud infrastructures, the client necessarily cedes control to the Cloud LOCK-IN: there is currently little on offer in the way of tools, procedures or standard data formats ISOLATION FAILURE: multi-tenancy and shared resources are defining characteristics of cloud computingCOMPLIANCE RISKS: investment in achieving certification (e.g., industry standard or regulatory MANAGEMENT INTERFACE COMPROMISE: customer management interfaces of a public cloud providerDATA PROTECTION: cloud computing poses several data protection risks for cloud customers and providers. INSECURE OR INCOMPLETE DATA DELETION: when a request to delete a cloud resource is made, as with most MALICIOUS INSIDER: while usually less likely, the damage which may be caused by malicious insiders is