Balancing mobility algorithm for monitoring virtual machines in clouds

Sultan Alshamrani, Dariusz Kowalski, Leszek Gasieniec, Muhammed Abdulazeez

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Amid the rapid growth of Internet users, cybercrime is becoming one of the most challenging tasks for the systems and applications designers to deal with. The cybercrime threat is reflected in the increased number of cases and methods used by criminals. Systems based on cloud computing are natural targets due to their complexity (greater room for security weaknesses) and increasing popularity. Cloud computing is a modern technology that enables users to share resources in a virtual storage and computing environment. A cloud system is based on multiple physical servers. It provides a universal environment with a (large) number of Virtual Machines (VMs) that is available to many users accessing this system via the Internet. This form of access makes cloud systems weaker than physical networks. In order to prevent or minimize the number of attacks and in turn to secure data storage, any malicious behaviour such as external undesirable interventions should be rapidly identified and halted if possible. In this paper, we focus on the discovery of malicious behaviour via determining unwanted symptoms rather than via targeting particular malicious behaviours of the system directly. The main contribution of this paper consists in several new mechanisms for monitoring Virtual Machines and further experimental work targeting efficient ways of visiting VMs in order to discover malicious symptoms. We want to find the fastest and the best set of weights for visiting VMs.

Original languageEnglish (US)
Title of host publicationProceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016
EditorsRobert Koch, Gabi Dreo Rodosek
PublisherCurran Associates Inc.
Pages9-17
Number of pages9
ISBN (Electronic)9781910810934
StatePublished - Jan 1 2016
Externally publishedYes
Event15th European Conference on Cyber Warfare and Security, ECCWS 2016 - Munich, Germany
Duration: Jul 7 2016Jul 8 2016

Publication series

NameEuropean Conference on Information Warfare and Security, ECCWS
Volume2016-January
ISSN (Print)2048-8602
ISSN (Electronic)2048-8610

Conference

Conference15th European Conference on Cyber Warfare and Security, ECCWS 2016
CountryGermany
CityMunich
Period7/7/167/8/16

Fingerprint

Monitoring
Cloud computing
Virtual storage
Internet
Servers
Data storage equipment
Virtual machine
World Wide Web
Targeting
Cybercrime

Keywords

  • Cloud computing
  • Cloud monitoring
  • Malicious behaviour
  • Network patrolling
  • Virtual Machines

ASJC Scopus subject areas

  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Cite this

Alshamrani, S., Kowalski, D., Gasieniec, L., & Abdulazeez, M. (2016). Balancing mobility algorithm for monitoring virtual machines in clouds. In R. Koch, & G. D. Rodosek (Eds.), Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016 (pp. 9-17). (European Conference on Information Warfare and Security, ECCWS; Vol. 2016-January). Curran Associates Inc..

Balancing mobility algorithm for monitoring virtual machines in clouds. / Alshamrani, Sultan; Kowalski, Dariusz; Gasieniec, Leszek; Abdulazeez, Muhammed.

Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016. ed. / Robert Koch; Gabi Dreo Rodosek. Curran Associates Inc., 2016. p. 9-17 (European Conference on Information Warfare and Security, ECCWS; Vol. 2016-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Alshamrani, S, Kowalski, D, Gasieniec, L & Abdulazeez, M 2016, Balancing mobility algorithm for monitoring virtual machines in clouds. in R Koch & GD Rodosek (eds), Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016. European Conference on Information Warfare and Security, ECCWS, vol. 2016-January, Curran Associates Inc., pp. 9-17, 15th European Conference on Cyber Warfare and Security, ECCWS 2016, Munich, Germany, 7/7/16.
Alshamrani S, Kowalski D, Gasieniec L, Abdulazeez M. Balancing mobility algorithm for monitoring virtual machines in clouds. In Koch R, Rodosek GD, editors, Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016. Curran Associates Inc. 2016. p. 9-17. (European Conference on Information Warfare and Security, ECCWS).
Alshamrani, Sultan ; Kowalski, Dariusz ; Gasieniec, Leszek ; Abdulazeez, Muhammed. / Balancing mobility algorithm for monitoring virtual machines in clouds. Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016. editor / Robert Koch ; Gabi Dreo Rodosek. Curran Associates Inc., 2016. pp. 9-17 (European Conference on Information Warfare and Security, ECCWS).
@inproceedings{f0a1ae274a124589bf7d942617032858,
title = "Balancing mobility algorithm for monitoring virtual machines in clouds",
abstract = "Amid the rapid growth of Internet users, cybercrime is becoming one of the most challenging tasks for the systems and applications designers to deal with. The cybercrime threat is reflected in the increased number of cases and methods used by criminals. Systems based on cloud computing are natural targets due to their complexity (greater room for security weaknesses) and increasing popularity. Cloud computing is a modern technology that enables users to share resources in a virtual storage and computing environment. A cloud system is based on multiple physical servers. It provides a universal environment with a (large) number of Virtual Machines (VMs) that is available to many users accessing this system via the Internet. This form of access makes cloud systems weaker than physical networks. In order to prevent or minimize the number of attacks and in turn to secure data storage, any malicious behaviour such as external undesirable interventions should be rapidly identified and halted if possible. In this paper, we focus on the discovery of malicious behaviour via determining unwanted symptoms rather than via targeting particular malicious behaviours of the system directly. The main contribution of this paper consists in several new mechanisms for monitoring Virtual Machines and further experimental work targeting efficient ways of visiting VMs in order to discover malicious symptoms. We want to find the fastest and the best set of weights for visiting VMs.",
keywords = "Cloud computing, Cloud monitoring, Malicious behaviour, Network patrolling, Virtual Machines",
author = "Sultan Alshamrani and Dariusz Kowalski and Leszek Gasieniec and Muhammed Abdulazeez",
year = "2016",
month = "1",
day = "1",
language = "English (US)",
series = "European Conference on Information Warfare and Security, ECCWS",
publisher = "Curran Associates Inc.",
pages = "9--17",
editor = "Robert Koch and Rodosek, {Gabi Dreo}",
booktitle = "Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016",

}

TY - GEN

T1 - Balancing mobility algorithm for monitoring virtual machines in clouds

AU - Alshamrani, Sultan

AU - Kowalski, Dariusz

AU - Gasieniec, Leszek

AU - Abdulazeez, Muhammed

PY - 2016/1/1

Y1 - 2016/1/1

N2 - Amid the rapid growth of Internet users, cybercrime is becoming one of the most challenging tasks for the systems and applications designers to deal with. The cybercrime threat is reflected in the increased number of cases and methods used by criminals. Systems based on cloud computing are natural targets due to their complexity (greater room for security weaknesses) and increasing popularity. Cloud computing is a modern technology that enables users to share resources in a virtual storage and computing environment. A cloud system is based on multiple physical servers. It provides a universal environment with a (large) number of Virtual Machines (VMs) that is available to many users accessing this system via the Internet. This form of access makes cloud systems weaker than physical networks. In order to prevent or minimize the number of attacks and in turn to secure data storage, any malicious behaviour such as external undesirable interventions should be rapidly identified and halted if possible. In this paper, we focus on the discovery of malicious behaviour via determining unwanted symptoms rather than via targeting particular malicious behaviours of the system directly. The main contribution of this paper consists in several new mechanisms for monitoring Virtual Machines and further experimental work targeting efficient ways of visiting VMs in order to discover malicious symptoms. We want to find the fastest and the best set of weights for visiting VMs.

AB - Amid the rapid growth of Internet users, cybercrime is becoming one of the most challenging tasks for the systems and applications designers to deal with. The cybercrime threat is reflected in the increased number of cases and methods used by criminals. Systems based on cloud computing are natural targets due to their complexity (greater room for security weaknesses) and increasing popularity. Cloud computing is a modern technology that enables users to share resources in a virtual storage and computing environment. A cloud system is based on multiple physical servers. It provides a universal environment with a (large) number of Virtual Machines (VMs) that is available to many users accessing this system via the Internet. This form of access makes cloud systems weaker than physical networks. In order to prevent or minimize the number of attacks and in turn to secure data storage, any malicious behaviour such as external undesirable interventions should be rapidly identified and halted if possible. In this paper, we focus on the discovery of malicious behaviour via determining unwanted symptoms rather than via targeting particular malicious behaviours of the system directly. The main contribution of this paper consists in several new mechanisms for monitoring Virtual Machines and further experimental work targeting efficient ways of visiting VMs in order to discover malicious symptoms. We want to find the fastest and the best set of weights for visiting VMs.

KW - Cloud computing

KW - Cloud monitoring

KW - Malicious behaviour

KW - Network patrolling

KW - Virtual Machines

UR - http://www.scopus.com/inward/record.url?scp=84979211579&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84979211579&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84979211579

T3 - European Conference on Information Warfare and Security, ECCWS

SP - 9

EP - 17

BT - Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016

A2 - Koch, Robert

A2 - Rodosek, Gabi Dreo

PB - Curran Associates Inc.

ER -