An Intelligent Intrusion Detection System For Cloud Computing (SIDSCC)
An Intelligent Intrusion Detection System For Cloud Computing (SIDSCC)
Abstract—Cloud computing is a distributed architecture that cloud computing by large organisations is the threat posed
has shared resources, software, and information. There exists to its security [8]. There are high chances of induction into
a great number of implementations and research for Intrusion the data due to distributed nature of such systems. Today,
Detection Systems (IDS) in grid and cloud environments;
however they are limited in addressing the requirements for it is noted that business organisations dismiss potentially
an ideal intrusion detection system. Security issues in Cloud theoretical threats that could occur through the use of Cloud
Computing (CC) have become a major concern to its users, Service Providers (CSP), however they emphasise practical
availability being one of the key security issues. Distributed fears and threats [9]. Such these threats to security include
Denial of Service (DDoS) is one of these security issues that integrity of data, the level of confidentiality and availability
poses a great threat to the availability of the cloud services.
The aim of this research is to evaluate the performance of [10].
IDS in CC when the DDoS attack is detected in a private
cloud, named SaaSCloud. A model has been implemented on As this current research investigates the effectiveness of
three virtual machines; SaaSCloud Model, DDoS attack Model, IDS in cloud computing through DDoS attack, the data, the
and IDSServer Model. Through this implementation, Service application and the non-availability of services can be seen
Intrusion Detection System in Cloud Computing (SIDSCC) will by the help of the DOS and the DDoS [11]. This research
be proposed, investigated and evaluated. will highlight the importance of IDS whereby it relies on
Keywords-IDS; DDoS Attack; ICMP Flood; Cloud Comput- the host, the network and the use of specific kind of host
ing; SaaSCloud; IDSServer; SIDSCC machines.
136
620
received, the SaaSCloud requests the IDSServer to detect • identify the scenario and proper way of detecting DDoS
the IPs so that the activity can be blocked. The admin in attack and its method to apply the IDS in cloud.
turn needs to send an alert to the SaaSCloud user while the • specify the proper applications that should run on the
IDSServer is analysing the console for intrusion databases. system from the participants point of view.
Then the admin will send the malicious IPs to CSP to deal Overall, there were thirty-seven participants in this re-
with them. search. The responses were collected from six countries,
which are UK, Germany, Syria, Saudi Arabia, Pakistan
and Oman. Based on the results of the questionnaire, the
artefact was developed (SIDSCC System) depending on the
following scenario: In the setup (as shown in Fig. 2), ma-
licious activities detection was performed by an IDSServer
and administrator alerts occurred when a packet from the
ICMP layer came through the network traffic. The network
using the IDSServer had to be placed on an individual
virtual machine so that it could work effectively. Windows
7 was used as a virtual machine so that SaaSCloud server
could be created in it. To create a private cloud Web
Page was deployed using Win-SQLServer and Apache using
WampServer in order to run the server. The administrator
monitored unusual traffic by EagleX, as it reported all the
logs to the admin immediately. If there was an attacker
attempting penetration of data or attempting to flood the
network, the notification would not go to the user. It would
be notified in an indirect manner by the help of a service
Figure 1. Flowchart of How SIDSCC Service Works provider. In the SIDSCC system, there was the presence of
a great deal of traffic in the SaaSCloud, so they were not in
a position to handle any large amounts data.
B. An intelligent SIDSCC System Approach
Prior to the design of this approach there was a ques-
tionnaire undertaken that was based on the literature review
and the information that had to be collected so that the
aims of the project could be investigated. The questionnaire
was to be answered by a sample group with some specialist
knowledge, experience or interest in IDS in order to observe
different opinions in cloud computing and IDS [25]. This
was propagated through social networking websites such as
LinkedIn, Facebook and Twitter. The time of responses taken
was two weeks.
The types of questions used in the questionnaire were
closed-ended questions so quantitative analysis could be
Figure 2. Scenario of Artefact
collected. Thus allowing for answers defined as ’a series
of statements all of which are related to a particular target
This scenario emphasises on monitoring the SaaSCloud
which respondents are asked to indicate the extent to which
for the DDoS attack. This relies on evaluation metrics of
they agree or disagree with by marking one of the responses
IDS: load and memory load, available bandwidth, latency
ranging from 1 highest level of importance to 5 lowest
and filter by destination and resources.
level of importance [26]. Participants are asked 10 questions
relating to the importance of the most advantages level in C. Artefact Development (SIDSCC System)
cloud computing. The focal point of the questionnaire was As mentioned earlier, the scenario of ICMP flood has
to: been proposed due to the flooding of network when ICMP
• study the effectiveness of cloud computing. packets consume all the available bandwidth [21]. In this
• specify a proper service and type of cloud computing scenario, the SaaSCloud with a DDoS attack and IDSServer
• determine the main security issues was investigated and evaluated where the IDSServer reacts
• measure the complicity of the most common attacks to the attacks when they go to the SaaSCloud.
137
621
1) SaaSCloud
Firstly a PHP webpage was created in order for the
attacker to implement and send the ICMP attack on it
then the IDS could detect and alert the administrator.
Apache was then used as a web server, which has
been used because of its ease of use even though it is
Figure 3. SIDSCC Performance
fairly limited in its functionality. However, it allows
the system to operate on logs produced by different
web servers, such as Apache and Microsoft Internet
Information Services (IIS). The technique of Apache is ICMP. It should be noted from the latter part of the first day
a straightforward way of logging attempts at accessing of this experiment that the alarm was increased dramatically
vulnerable scripts or programs on a website. Lastly, the and steady whereas the web page was not available as it was
application of Microsoft SQL Server has been installed flooded by the ICMP attack. The IDSServer, in this scenario,
in order to create computer databases for the Microsoft is reacting to the ICMP attacks where, in this attack, the
Windows family of server operating systems and it attacker sends intelligent ICMP packets over the SaaSCloud
provides an environment used to generate databases in specified time intervals in an intermittent manner with
that can be accessed from workstations or via the low period time while the SaaSCloud is down.
internet.
2) IDSServer
In order to establish IDS server, Snort, as an open
source for detecting malicious activities in cloud com-
puting, works as an IDS Server. This has been con-
figured and installed on Windows 7 (32-bit) operating
system, and then, configured and installed its rules, Figure 4. SaaSCloud Downtime
which includes DDoS rules particularly ICMP flood,
and deciphering alerts and tailoring to SaaSCloud.
After that SIDSCC service used two virtual machines 3) IDSServer Performance: As mentioned earlier, the
using BackTrack5 operating system in order to test the IDSServer utilised for detection of the malicious activities of
effectiveness of IDSServer to detect the ICMP attack. the ICMP attack that comes into SaaSCloud. IDSServer has
been designed to rely on the interactive start. This means that
IV. T ESTING AND D ISCUSSION if the BackTrack user demands more than standard range, the
1) SIDSCC System Performance: Several unique require- IDSServer considers that the attacker is intentionally trying
ments, according to the comparison of SIDSCC to other to perform the DDoS attack.
relevant researches, have been set prior to designing and im- In this experiment as shown in Fig. 5., several ICMP pack-
plementing the SaaSCloud components of SIDSCC system. ets has been sent over SaaSCloud network, and IDSServer
According to the Fig. 3, it shows that the SIDSCC system informed the admin to block this specific IP, namely, when
measures the performance of IDS in cloud computing, which an attacker wanted to send ICMP packets with a suspect total
is represented in percentage of alarms, response time, CPU length, IDSServer was activated and monitored the IP of the
load and traffic. The period of testing this service was over attacker. At this time, the performance of SaaSCloud was
three days but was not continuous. During this period, it kept in certain variables because when the attacker sends
was noted that the line of alarm increased gradually and another request at next time range, the amount of time for
was detecting the ICMP packets that came into SaaSCloud. the new packet is added to the total time variable. Then the
Moreover, SIDSCC service measured the amount of com- SIDSCC system compared this variable with the behavioural
putational work that was performed. It is also noted that the start; if it is higher, SaaSCloud users identify the attacker
load average represents the average of SIDSCC performance and then IDSServer will automatically block it.
during over three days. There was a sharp increase in the
Overall, the easiest way for defining the start of DDoS
second day, as the SIDSCC system was overwhelmed by
attack was to set the constant value for it. However, this
the DDoS attack. The traffic was abnormal when sending
was not an optimal solution owing to the probability of
ICMP packets to SaaSCloud while the response time was
false detection when it was high. An important point is
down; however it rose highly when the victim received the
that this value should be chosen so that possibility of false-
DDoS attack.
negative detection (legitimate users rather than the attacker)
2) SaaSCloud Performance: As shown in Fig. 4, it shows
is reduced. In the SIDSCC system, the threshold determined
that SaaSCloud is affected by DDoS attack when the attacker
as a dynamic variable was based on the network position and
started flooding the SaaSCloud network by several packets of
pressure of traffic automatically.
138
622
Figure 6. Evaluating CPU Load in SIDSCC System
Figure 5. IDSServer Performance
V. E VALUATION
The experiments that have been described in the previous
Figure 7. Evaluating Memory Load on SIDSCC System
sections were completed including sending the attacking
traffic and the background traffic. The IDSServer was
stopped at the end of each of the experiments and the data that the experiment does not lead to any kind of bias in the
was analysed at a further point in time. Additionally, the test. Only if SaaSCloud is being crossed by the background
machine that was hosting IDSServer was restarted after all traffic, the value is seen to be 2.47 Mbps. There is a result
the experiments to ensure the environment after each of the from the ICMP protocols, when the attacking traffic has
experiments was the same. Fig. 6. is a representation of reached a value of close to 15000 pps. In case of the
the CPU load in complete relation with the speed traffic available bandwidth being zero the value is seen to be 25000
of the ICMP attacks that took place. In Fig.7., there is an pps. After this value, the rate of malicious traffic is seen to
illustration of the results of memory load; the data for the reach a value of 6000 pps; the bandwidth that is valuable can
experiment have been taken at a similar time to the time that detect half the value, but in case of crossing of background
the CPU load results have been seen. After this point, the traffic by the IDSServer.
results of the available bandwidth are also shown in the Fig.
8., but the Fig.9 is a representation of the results related to
the latency. The Fig. 10 and Fig. 11 are representative of
viewing the filter rate by the experiments at destination and
they are filtered by the source experiment. If the results are
seen of the attacking traffic ICMP packet with a value of Figure 8. Evaluating Available Bandwidth on SIDSCC System
0 pps, it is representative of the background value crossing
the IDS value [27] and [28].
C. Latency
A. CPU and Memory Load There was a growth of latency along with the growth
There is reliance of CPU load on the rate of traffic that in background traffic. For the availability of bandwidth,
can be processed by SaaSCloud and IDSServer. The attack there has been a conduction of the test without the use of
of ICMP was in need of fewer amounts of resources, as the IDSServer and the experiment for the evaluation of impact of
value stays at 40-39% of the usage of CPU. In case of an the test on the overall results. If IDSServer was not there, the
ICMP, the sent packets were seen to be very small; thereby latency was seen to be 0.4105 ms and the rest of IDSServer
the processing time was very small for taking a decision is around 0.7435ms. The aforementioned is conclusive of the
towards these packets. After the rate of 6000 pps, it was fact that the experiment does not affect the results because
seen to have been reached the load stays stable around 40%. of the relatively small impact it has on the experiment. The
The results of the ICMP highlight the fact that there may latency is seen to be 2.219ms when there was crossing of
be an optimisation by IDSServer at the processing stage background traffic by SaaSCloud. There was a multiplication
of the packets. Although the results have showcased an of latency by two between each of the measures. If the rate
augmentation of the memory load, this is not significant of 6,000 pps is reached, the latency value for ICMP attack
because the augmentation is in range of 20 Mbytes. This is seen in area of 23ms and in case of attacking traffic on
may be due to the fact that the machine is running on a very display value of 7,500 pps, the latency is seen to be in range
limited kind of virtual machine, and there was no possibility of 71ms. This is a highlight of the fact that IDS may have to
of knowing the handling of memory by the system [27]. process a certain degree of optimisation in case of latency
becoming a very important factor.
B. Available Bandwidth
The availability of the bandwidth was seen to be 8.05 D. Rate Filter by Destination
Mbps, when the IDSServer was not seen as a part of the The experimental results are in direct correlation with the
network. The available bandwidth was seen to be 7.86 Mbps, expected type of results. Along with the growth of detected
when it was seen as part of the network. It can be concluded packets, the growth of malicious packets is very important.
139
623
be configured on Snort properly and then linked to the
IDScenter so that it can attack SaaSCloud and alarm the
admin of IDSServer to detect and then blocked by CSP.
Having identified the limitations of this project, a more
comprehensive study that employs a combination of quanti-
Figure 9. Evaluating Latency on SIDSCC System
tative and qualitative research methods as well as covering a
wider technical area within DDoS attacks would be recom-
The detected packets number increase rapidly after the ratio mended, following the evolution metrics to SIDSCC system.
of 5,000 attacking packets per second has been reached. Through observation the levels of IDS such as HIDS and
After the value of 15,000pps, the total amount of detected NIDS and techniques of IDS such as SD and AD would
traffic was representative of 50% of the value. be also greatly recommended followed by a comparison
between each level and technique which would give the
SIDSCC a technological and scientific value. As a result,
future studies may consider implementing as many type
of attacks as possible using labs of institutions where they
should work alongside technicians. It is also recommended
to engage with other interested parties in the project, not
Figure 10. Evaluating Rate Filter By Destination on SIDSCC System
only educational institutions, but industries implementing
such technologies.
VI. C ONCLUSION AND F UTURE W ORK
R EFERENCES
SIDSCC service results illustrate that IDSServer possesses
[1] I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud computing and
an effective mechanism against ICMP packets that comes grid computing 360-degree compared,” in Grid Computing
over SaaSCloud. It highlights the major vulnerabilities of Environments Workshop, 2008. GCE’08. Ieee, 2008, pp. 1–
SaaSCloud network, which is the rate of packets lost. 10.
When the SIDSCC system reaches 16%, 58%, or 54% CPU
[2] L. M. Vaquero, L. Rodero-Merino, and D. Morán, “Locking
load depending on ICMP packets increases and then the
the sky: a survey on iaas cloud security,” Computing, vol. 91,
IDSServer starts detecting the attack and alarms SaaSCloud no. 1, pp. 93–118, 2011.
user and IDSServer admin. There was a known alarm
wherein the admin deal with this attack or allow the CSP [3] S. Roschke, F. Cheng, and C. Meinel, “Intrusion detection in
to solve it. There was a connection where the attacking the the cloud,” in Dependable, Autonomic and Secure Computing,
2009. DASC’09. Eighth IEEE International Conference on.
traffic speed of 6000 pps which was the point of IDSServer. IEEE, 2009, pp. 729–734.
When the rate rises to this level, the IDSServer could not
guarantee that the legitimate user will still have access [4] P. Presseria. (2012) Cyber attacks statis-
to the services of the trusted SaaSCloud neither that no tics.¨[online]. hackmageddon, 2012a. [Online]. Available:
abnormal ICMP packets will arrive to its target. SIDSCC http://hackmageddon.com/2013-cyber-attacks-statistics/
Service also provided an excellent reliability wherein it [5] B. Al-Duwairi and G. Manimaran, “Just-google: a search
could detect ICMP attack within more than 10 hours without engine-based defense against botnet-based ddos attacks,” pp.
causing any problem in terms of impact metrics. It is very 1–5, 2009.
significant to note that the number of packets detected
[6] Amazon. (2009) Amazon virtual private cloud.¨(amazon
increase with the time of use. Overall, these results proved
vpc) [online]. amazon web services. [Online]. Available:
that the vulnerabilities of SaaSCloud and evaluation metrics http://aws.amazon.com/vpc/
design of SIDSCC service can be used to evaluate IDS in
cloud computing. It can be said that the overall findings [7] J. O. Fitó and J. Guitart, “Initial thoughts on business-driven
indicate that after implementation and collection of these it management challenges in cloud computing providers,”
in Integrated Network Management (IM), 2011 IFIP/IEEE
results from the SIDSCC system, IDSServer can be used International Symposium on. IEEE, 2011, pp. 1070–1073.
to protect the SaaSCloud, which will not be greater than
1Mbps. However, this system will not be a possible target [8] G. Brunette and R. Mogull, “Security guidance for critical
to ICMP packets that will use attacking rates higher than areas of focus in cloud computing v2. 1,” Cloud Security
6000 pps. When this rate is overcome legitimate users might Alliance, Tech. Rep., 2009.
have to endure a DOS which will likely be the goal of the [9] S. Bates. (2010) Understanding risk management
attacker. Having reviewed these findings, it can be claimed approaches in the cloud computing service model.”,
that the current study enhances our understanding of how [online]. security thought. [Online]. Available:
IDSServer in practice can secure SaaSCloud against DDoS http://shaynebates.blogspot.co.uk/2010/11/understanding-
attacks. One possible implication is that ICMP attack should risk-management.html
140
624
[10] J. Brodkin, “Gartner: Seven cloud-computing security risks,” [26] Z. Dörnyei and T. Taguchi, Questionnaires in second lan-
2008. guage research: Construction, administration, and process-
ing. Routledge, 2009.
[11] C.-C. Lo, C.-C. Huang, and J. Ku, “A cooperative intrusion
detection system framework for cloud computing networks,” [27] W. J. Buchanan, F. Flandrin, R. Macfarlane, and J. Graves,
in Parallel Processing Workshops (ICPPW), 2010 39th Inter- “A methodology to evaluate rate-based intrusion prevention
national Conference on. IEEE, 2010, pp. 280–284. system against distributed denial-of-service (ddos).” 2011.
[12] H. Kozushko, “Intrusion detection: host-based and network- [28] J. Sommers, V. Yegneswaran, and P. Barford, “Toward com-
based intrusion detection systems,” on September, vol. 11, prehensive traffic generation for online ids evaluation,” Uni-
2003. versity of Wisconsin, Tech. Rep, 2005.
[13] J. Peng, X. Zhang, Z. Lei, B. Zhang, W. Zhang, and Q. Li,
“Comparison of several cloud computing platforms,” in In-
formation Science and Engineering (ISISE), 2009 Second
International Symposium on. IEEE, 2009, pp. 23–27.
[22] Q. Chen and Q.-n. Deng, “Cloud computing and its key
techniques,” Journal of Computer Applications, vol. 29, no. 9,
p. 2565, 2009.
141
625