2015 11th European Dependable Computing Conference (EDCC) 2015
DOI: 10.1109/edcc.2015.10
|View full text |Cite
|
Sign up to set email alerts
|

Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds

Abstract: This paper describes an approach for the automated security evaluation of operational Network Intrusion Detection Systems (NIDS) in Infrastructure as a Service (IaaS) cloud computing environments. Our objective is to provide automated and experimental methods to execute attack campaigns and analyze NIDS reactions, in order to highlight the ability of the NIDS to protect clients' virtual infrastructures and find potential weaknesses in their placement and configuration. To do so, we designed a three-phase appro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…To measure the effectiveness of an NIDS in a cloud environment, Probst et al [14] describe a method in two phases: an analysis of network access control followed by the IDS evaluation in a cloned infrastructure based on the set of services running in the virtual infrastructure. Before this work, Massicotte et al [15] used a virtual infrastructure to generate traffic traces and used the trace to evaluate IDSs hosted in physical servers.…”
Section: Security Monitoring Setup Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…To measure the effectiveness of an NIDS in a cloud environment, Probst et al [14] describe a method in two phases: an analysis of network access control followed by the IDS evaluation in a cloned infrastructure based on the set of services running in the virtual infrastructure. Before this work, Massicotte et al [15] used a virtual infrastructure to generate traffic traces and used the trace to evaluate IDSs hosted in physical servers.…”
Section: Security Monitoring Setup Evaluationmentioning
confidence: 99%
“…Any mechanism that can simulate the network behavior of an application could be used in our methodology. In [14] an automaton is used to model network exchanges of an application with a legitimate and a malicious user. More realistic simulations produce more accurate results.…”
Section: Target Vmmentioning
confidence: 99%
“…To verify an IDS, Probst et al [5] describe a method in two phases: an analysis of network access control followed by the IDS evaluation based on the set of services running in the virtual infrastructure. Before this work, Massicotte et al [4] used a virtual infrastructure to generate traffic traces and used the traces to evaluate IDSs in traditional servers (non-cloud environment).…”
Section: Related Workmentioning
confidence: 99%
“…The life-cycle of an SLA can be separated in three phases called SLA definition and negotiation, SLA enforcement and SLA verification [20]. Methods were proposed for the SLA verification phase in the case of an NIDS [2,18,22]. In this paper, we show how we can achieve the SLA definition and negotiation phase, thanks to new constructs in a cloud SLA language and an efficient knowledge-base building method for NIDS performance.…”
Section: Introductionmentioning
confidence: 99%