skip to main content
10.1145/3090354.3090405acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdcaConference Proceedingsconference-collections
research-article

Mobiles Agents and Virtual Firewall to Secure the Shared Network for Virtual Machines in IaaS cloud

Authors Info & Claims
Published:29 March 2017Publication History

ABSTRACT

Cloud computing is a new paradigm based on distributed services. It allows to reduce costs and simplify the management of resources. Positioning the cloud in an operational environment provides easy and quick access to computing resources anywhere, anytime, with any device. However, it is deployed in virtual resources to provide services to public customers and private organizations. In fact, without security measures, distributed cloud services are vulnerable. It acquires knowledge about vulnerabilities, attacks, activities of attackers and tools to secure it. In this paper, we will propose a framework for detecting and repairing distributed intrusions in private cloud. However, we focus on the security of virtual network in virtualized environment. In order to secure inside or outside communication of virtual machines, we suggest using our framework based on snort, mobile agents and virtual firewall. This framework allows to reach three objectives: the first, detection intrusion in a virtual environment using mobile agents for collecting malicious data. The second, generating new signatures from malicious data, which were collected in the first phase. Finally, dynamic deployment of remote response actions using virtual firewall. By this type of close-loop control, the collaborative network security management framework can identify and address new distributed attacks more quickly and effectively.

References

  1. M. Firdhous, O. Ghazali and H. Suhaidi. "Trust Management in Cloud Computing: A Critical Review" International Journal on Advances in ICT for Emerging Regions, 2011.Google ScholarGoogle Scholar
  2. H. Wu, Y. Ding, C. Winer, and L. Yao, "Network security for virtual machine in cloud computing", 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), Seoul, pp. 18--21, 2010.Google ScholarGoogle Scholar
  3. N. Modi et all "Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review", The Journal of Supercomputing,. 2016.Google ScholarGoogle Scholar
  4. J. D. Araújoet et all, "EICIDS-elastic and internal cloud-based detection system", International Journal of Communication Networks and Information Security (IJCNIS), 2015.Google ScholarGoogle Scholar
  5. Hai J, Guofu Xet all, AVMM-based intrusion prevention system in cloud computing environment. J Supercomput Springer Sci, 2013.Google ScholarGoogle Scholar
  6. Vieira K, Schulter A, Westphall C, Westphall C, Intrusion detection techniques in grid and cloud computing environment. IEEE, 2010.Google ScholarGoogle Scholar
  7. Zayed Al Haddad, Mostafa Hanoune and Abdelaziz Mamouni. "A Collaborative Network Intrusion Detection System (C-NIDS) in Cloud Computing", International Journal of Communication Networks and Information Security (IJCNIS) Vol. 8, No. 3, December 2016Google ScholarGoogle Scholar
  8. Toumi, H., B. Marzak, A. Talea, A. Eddaoui, and M. Talea. "Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment", International Journal of Interactive Multimedia and Artificial Intelligence, Vol. 4, 2017Google ScholarGoogle Scholar
  9. H. Toumi, A. Talea, B. Marzak, A. Eddaoui, M. Talea, "Cooperative Trust Framework for Cloud Computing Based on Mobile Agents". International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7, No. 2, August 2015Google ScholarGoogle Scholar
  10. H. Toumi, A. Eddaoui and M. Talea." Cooperative Intrusion Detection System Framework Using Mobile Agents for Cloud Computing". Journal of Theoretical and Applied Information Technology 10th December 2014. Vol.70 No.1Google ScholarGoogle Scholar
  11. Kaaviyan Kanagasabapathi, S. Deepak and P. Prakash. "A Study on Security Issues in Cloud Computing", Springer India 2016.Google ScholarGoogle ScholarCross RefCross Ref
  12. Keiko H, DavidGR, Eduardo FM, Eduardo BF. An analysis of security issues for cloud computing. J Internet Serv Appl, 2013.Google ScholarGoogle Scholar
  13. H. Toumi, M. Talea, K. Sabiri, A. Eddaoui. "Toward a trusted framework for cloud computing", International Conference on Cloud Computing Technologies and Applications CLOUDTECH, IEEE, 2015. Google ScholarGoogle ScholarCross RefCross Ref
  14. N. Afzali Seresht, R. Azmi. "MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach". Engineering Applications of Artificial Intelligence 35, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Fahad F. Alruwaili and T. Aaron Gulliver. "CCIPS: A Cooperative Intrusion Detection and Prevention Framework for Cloud Services", Int. J Latest Trends Computing, December 2013.Google ScholarGoogle Scholar
  16. Amirreza Zarrabi and Alireza Zarrabi, "Internet Intrusion Detection System Service in a Cloud". International Journal of Computer Science Issues, September 2012.Google ScholarGoogle Scholar
  17. Paweł Lubomski, Andrzej Kalinowski, Henryk Krawczyk. "Multi-level Virtualization and Its Impact on System Performance in Cloud Computing". Proceedings, 23rd International Conference, CN 2016, Brunów, Poland, Springer, June 14--17, 2016, Switzerland. Google ScholarGoogle ScholarCross RefCross Ref
  18. Kamaruzaman Maskat, Mohd Afizi Mohd Shukran, Mohammad Adib Khairuddin. "Using Agent Based SNORT in Intrusion Detection Systems", International Conference on Industrial and Intelligent Information (ICIII 2012) IPCSIT vol.31, 2012Google ScholarGoogle Scholar
  19. Youssef Mifrah, Abdeslam En-Nouaary, Mohamed Dahchour. "An Abstract Framework for Introducing Computational Trust Models in JADE-Based Multi-Agent Systems", Advances in Ubiquitous Networking, Springer, 2016Google ScholarGoogle ScholarCross RefCross Ref
  20. Sho Oishi, Naoki Fukuta. "A Cooperative Task Execution Mechanism for Personal Assistant Agents Using Ability Ontology", 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI), IEEE, 2017Google ScholarGoogle Scholar
  21. AfnanFahim, AbderrahmenMtibaa, and Khaled A. Harras," Making the Case For Computational Offloadingin Mobile Device Clouds", June 2013.Google ScholarGoogle Scholar
  22. David I. Fadaraliki, S. Rajendran. "Process Offloading from Android Device to Cloud Using JADE", International Conference on Circuit, Power and Computing Technologies, 2015.Google ScholarGoogle Scholar
  23. Jaydip Sen. "A Distributed Intrusion Detection System Using Cooperating Agents", In Proceedings of the 3rd International Conference on Information Processing (ICIP'09), August 7-9, Bangalore, 2009, pp. 559--568.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications
    March 2017
    685 pages
    ISBN:9781450348522
    DOI:10.1145/3090354

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 29 March 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader