The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

06/20/2022
by   Nikolaos Pitropakis, et al.
0

The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their quest came to end with the birth of Cloud Computing infrastructures. However, along with the new promising technology, new attack vectors were born, and one old and known threat, that of Malicious Insiders reappeared. Insiders can use their privileged position inside the Cloud infrastructure to accomplish or help in attacks against a Cloud infrastructure. In this paper, we propose a practical and efficient intrusion detection system solution for Cloud infrastructures based on Graphical Processing Unit (GPU) acceleration. Our solution monitors the deployed virtual machines' operations and especially those of the host Operating System, known as Dom0, correlating the collected information to detect uncommon behavior based on the Smith-Waterman algorithm. Our proposal makes possible the cooperation of a variety of known hypervisors along with every known GPU acceleration unit used, thus offering the maximum of security mechanics while at the same time minimizing the imposed overhead in terms of Central Processing Unit (CPU) usage.

READ FULL TEXT
research
09/07/2020

Detection of Colluded Black-hole and Grey-hole attacks in Cloud Computing

The availability of the high-capacity network, massive storage, hardware...
research
02/17/2023

Towards Efficient Alternating Current Optimal Power Flow Analysis on Graphical Processing Units

We present a solution of sparse alternating current optimal power flow (...
research
04/07/2018

Evaluating virtual hosted desktops for graphics-intensive astronomy

Visualisation of data is critical to understanding astronomical phenomen...
research
12/15/2020

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

This paper reviews existing Intrusion Detection Systems (IDS) that targe...
research
05/25/2023

FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing

In recent times, I've encountered a principle known as cloud computing, ...
research
08/10/2022

PROFET: Profiling-based CNN Training Latency Prophet for GPU Cloud Instances

Training a Convolutional Neural Network (CNN) model typically requires s...
research
01/17/2023

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

The massive trend toward embedded systems introduces new security threat...

Please sign up or login with your details

Forgot password? Click here to reset