Win, Thu Yein ORCID: 0000-0002-4977-0511, Tianfield, Huaglory and Mair, Quentin (2017) Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing. IEEE Transactions on Big Data, 4 (1). pp. 11-25. doi:10.1109/TBDATA.2017.2715335
|
Text (Peer reviewed version)
Big data security.pdf - Accepted Version Available under License All Rights Reserved. Download (805kB) | Preview |
Abstract
Virtualized infrastructure in cloud computing has become an attractive target for cyberattackers to launch advanced attacks. This paper proposes a novel big data based security analytics approach to detecting advanced attacks in virtualized infrastructures. Network logs as well as user application logs collected periodically from the guest virtual machines (VMs) are stored in the Hadoop Distributed File System (HDFS). Then, extraction of attack features is performed through graph-based event correlation and MapReduce parser based identification of potential attack paths. Next, determination of attack presence is performed through two-step machine learning, namley logistic regression is applied to calculate attack's conditional probabilities with respect to the attributes, and belief propagation is applied to calculate the belief in existence of an attack based on them. Experiments are conducted to evaluate the proposed approach using well-known malware as well as in comparison with existing security techniques for virtualized infrastructure. The results show that our proposed approach is effective in detecting attacks with minimal performance overhead.
Item Type: | Article |
---|---|
Article Type: | Article |
Additional Information: | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Uncontrolled Keywords: | Virtualized infrastructure; Virtualization security; Cloud security; Malware detection; Rootkit detection; Security analytics; Event 14 correlation; Logistic regression; Belief propagation; REF2021 |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software Q Science > QA Mathematics > QA76 Computer software > QA76.9 Other topics > QA76.9.B45 Big data |
Divisions: | Schools and Research Institutes > School of Business, Computing and Social Sciences |
Research Priority Areas: | Applied Business & Technology |
Depositing User: | Susan Turner |
Date Deposited: | 27 Jul 2017 10:14 |
Last Modified: | 16 May 2024 13:34 |
URI: | https://eprints.glos.ac.uk/id/eprint/4823 |
University Staff: Request a correction | Repository Editors: Update this record