• Aucun résultat trouvé

Self Adaptation for Security Monitoring in IaaS clouds

N/A
N/A
Protected

Academic year: 2021

Partager "Self Adaptation for Security Monitoring in IaaS clouds"

Copied!
2
0
0

Texte intégral

(1)

HAL Id: hal-01340460

https://hal.inria.fr/hal-01340460

Submitted on 1 Jul 2016

HAL is a multi-disciplinary open access

archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Self Adaptation for Security Monitoring in IaaS clouds

Anna Giannakou, Louis Rilling, Christine Morin, Jean-Louis Pazat

To cite this version:

Anna Giannakou, Louis Rilling, Christine Morin, Jean-Louis Pazat. Self Adaptation for Security Monitoring in IaaS clouds . EIT Digital symposium on the future of cloud computing, Oct 2015, Rennes, France. 2015. �hal-01340460�

(2)

Self Adaptation for Security Monitoring in IaaS clouds

Anna Giannakou*, Louis Rilling

, Christine Morin*, Jean-Louis Pazat*

* Inria,

DGA

Self adaptability:

react to changes in

virtual and physical

infrastructures

Customiza4on: allow

tenants to request

detec6on of specific

types of a8acks

Scalability: adapt to

traffic load and changes

in the size of the

infrastructure

Cost minimiza4on: for

tenants and the provider

Adapta4on probes:

detect a change and

reconfigure the

components involved

Customized rules:

include IDS rules

targe6ng a tenant’s

deployed services

New sensor

deployment: rebalance

traffic analysis when a

local intrusion detec6on

sensor is overloaded

Component sharing:

tenants may share local

IDS sensors

Obje

c6ve

s

SA

ID

S

Fe

atu

re

s

1.  Infrastructure monitoring

probes no6fy the

adapta6on manager that a

topology change occurs and

relate the necessary

informa6on: VM id, VM IP,

hostname of physical host

2.  Adapta4on manager

decides which addi6onal

rules have to be ac6vated

in the local IDS (lIDS)

responsible for the new

host of the VM.

Decision based on:

- Deployed services (VM

info)

- Specific requests from

tenants (SLA info)

3.  The adapta6on manager

adapts the lIDS through

remote execu6on of the

adapta6on driver

Context: IaaS cloud environments.

Frequent infrastructure-related changes:

• 

VM crea6on, migra6on, destruc6on

• 

Service addi6on or removal

Goals

Evalua6ng the reconfigura6on

overhead & quality of

detec6on

Scenario

• 

Load balanced setup

representa6ve of a produc6on

env.

• 

3 interconnected VMs: web,

mail, DNS services

• 

2 lIDSs: one per virtual switch

0

1

2

3

4

5

6

Without

adapta6on

adapta6on

With

2.1

2.3

1.7

Time in

secs

Op4ons

Snort reconfigura6on

Actual Migra6on

4

Technologies

• 

Cloud deployed with Openstack

• 

Inter VM communica6on through

GRE tunnels on Open vSwitch

Problem: Frequent changes make tradi6onal security monitoring

fail

SAIDS architecture

Early evalua6on

Future Work

• 

Combine monitoring for provider

and tenants

• 

Add other devices: collectors,

aggregators

• 

Offer tenants par6al control of the

framework

Related work: Projects that par6ally address tenant driven

customiza6on and scalability issues

[1][2]

but fail to adapt to

frequent changes. [3] addresses self-adapta6on but not mul6-tenancy, tenant-driven customiza6on or cost-effec6veness.

[1] S. Roschke et al. Intrusion Detec6on in the Cloud. In Proc. DASC 2009

[2] C. Mazzariello et al. Integra6ng a network IDS into an open source Cloud Compu6ng

environment. In Proc. IAS 2010

[3] A. Wailly et al. VESPA: mul6-layered self-protec6on for cloud resources. In Proc. ICAC 2012

Results

Références

Documents relatifs

En étudiant les restes de la division par 32 des puissances de 7, montrer que si le couple (n , m) vérifie la relation (F) alors n est divisible par

[r]

[r]

[r]

Pour l’ouvrir il faut découvrir les trois chiffres qui composent

Déterminer la fonction dérivée des fonctions suivantes en ayant précisé auparavant l'ensemble sur lequel f

[r]

[r]