Reactive and Adaptive Security Monitoring in Cloud Computing

Clément Elbaz, Louis Rilling, C. Morin
{"title":"Reactive and Adaptive Security Monitoring in Cloud Computing","authors":"Clément Elbaz, Louis Rilling, C. Morin","doi":"10.1109/FAS-W.2018.00014","DOIUrl":null,"url":null,"abstract":"Cloud computing enabled service-level agreements (SLAs) to gain widespread use among information systems stakeholders. It is now normal for performance and availability of such systems to be carefully measured and evaluated. Contracts that include financial penalties in case of breach are now common. However security is lagging behind this trend; it is as important to stakeholders as performance and availability, but is generally not included in the scope of service-level agreements between stakeholders, and handled instead on a best-effort basis, without any transparency nor SLA with their clients. One reason for this is the difficulty of objectively measuring security. Indeed, the actual security level of a system is dependent on a wide range of factors, some intrinsic to the system - such as a design or implementation mistake resulting in a vulnerability - and some extrinsic to it. For instance, an external event such as the publication of a vulnerability in an open-source software dependency or a change of political context in a country can widely impact the risks faced by an information system even if no actual change were made to the system. These factors are even more numerous in multi-tenant cloud infrastructures because of the sheer number of actors involved - and their sometimes conflicting incentives - and opportunities for both attack and defense at scale. Security monitoring aims to detect and react to attacks in real time; Reactive security monitoring intends to take external events into account while doing so. Improving the accuracy of a system's overall security assessment can help transitioning security to a SLA paradigm and enable better transparency for all stakeholders.","PeriodicalId":164903,"journal":{"name":"2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS*W)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS*W)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FAS-W.2018.00014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Cloud computing enabled service-level agreements (SLAs) to gain widespread use among information systems stakeholders. It is now normal for performance and availability of such systems to be carefully measured and evaluated. Contracts that include financial penalties in case of breach are now common. However security is lagging behind this trend; it is as important to stakeholders as performance and availability, but is generally not included in the scope of service-level agreements between stakeholders, and handled instead on a best-effort basis, without any transparency nor SLA with their clients. One reason for this is the difficulty of objectively measuring security. Indeed, the actual security level of a system is dependent on a wide range of factors, some intrinsic to the system - such as a design or implementation mistake resulting in a vulnerability - and some extrinsic to it. For instance, an external event such as the publication of a vulnerability in an open-source software dependency or a change of political context in a country can widely impact the risks faced by an information system even if no actual change were made to the system. These factors are even more numerous in multi-tenant cloud infrastructures because of the sheer number of actors involved - and their sometimes conflicting incentives - and opportunities for both attack and defense at scale. Security monitoring aims to detect and react to attacks in real time; Reactive security monitoring intends to take external events into account while doing so. Improving the accuracy of a system's overall security assessment can help transitioning security to a SLA paradigm and enable better transparency for all stakeholders.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云计算中的响应式和自适应安全监控
云计算使服务水平协议(sla)在信息系统涉众中得到广泛使用。现在,仔细测量和评估这些系统的性能和可用性是正常的。如果违约,包括经济处罚的合同现在很常见。然而,安全性落后于这一趋势;对于涉众来说,它与性能和可用性一样重要,但通常不包括在涉众之间的服务水平协议范围内,而是在尽最大努力的基础上处理,没有任何透明度,也没有与客户的SLA。原因之一是难以客观地衡量安全性。实际上,系统的实际安全级别取决于一系列因素,其中一些是系统固有的因素(例如导致漏洞的设计或实现错误),还有一些是系统外在的因素。例如,公开开源软件依赖项中的漏洞或一国政治环境的变化等外部事件,即使没有对信息系统进行实际更改,也可能对信息系统面临的风险产生广泛影响。在多租户云基础设施中,这些因素甚至更多,因为涉及的参与者数量非常多——有时他们的动机相互冲突——以及大规模攻击和防御的机会。安全监控旨在实时检测和应对攻击;响应式安全监视打算在执行此操作时考虑外部事件。提高系统整体安全评估的准确性可以帮助将安全性转换为SLA范例,并为所有涉众提供更好的透明度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Towards Self-Adaptive Systems with Hierarchical Decentralised Control DymGPU: Dynamic Memory Management for Sharing GPUs in Virtualized Clouds Reactive and Adaptive Security Monitoring in Cloud Computing Aspects of Measuring and Evaluating the Integration Status of a (Sub-)System at Runtime Efficient Classification of Application Characteristics by Using Hardware Performance Counters with Data Mining
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1