SlideShare a Scribd company logo
1 of 20
Download to read offline
Paper ID: N117
ICCCI, Wuhan, China October 13th-15th 1
Session: Network and Application Technology
Mawlana Bhashani Science and Technology University,
Bangladesh
Performance Evaluation of Fuzzy Integrated Firewall Model
for Hybrid Cloud Based on Packet Utilization
Asma Islam Swapna, Ziaur Rahman, Md. Habibur Rahman, Md. Akramuzzaman
Dept. of Information and Communication Technology
ICCCI, Wuhan, China October 13th-15th 2
Presentation Summary
Introduction
Motivation
Proposed Model
Cloud Architecture
Fuzzified Firewall Model
Rules and Security Levels
Results Evaluation
Contribution & Conclusion
References
ICCCI, Wuhan, China October 13th-15th 3
Introduction
Cloud ?
Distributed Service provided over Internet
• Private
Enterprises control access, high security
• Public
Users gain access to cloud easily on demand
• Hybrid
Integration of Public and Private Cloud
ICCCI, Wuhan, China October 13th-15th 4
Source: The Age of the Customer by Jim Blasingame, 2015
Introduction (Cont.)
Hybrid Cloud Security !
Flexible data access  Intrusion Prevention System (IPS)
Ex. Firewall ?
Controls and filters the incoming and outgoing
traffic of a system standing between the internal
network and world outside
ICCCI, Wuhan, China October 13th-15th 5
Introduction (Cont.)
Fuzzy System
• Describe complex systems with linguistic descriptions
• A control system based on fuzzy logic and operates on fuzzy controller
Fuzzy Control System
ICCCI, Wuhan, China October 13th-15th 6
Fuzzy Controller
Process Model
Control Rules
ControlInput Output
Source: MICHIO SUGENO , An Introductory Survey of Fuzzy Control, 1985
Error
Motivation
• Distributed, autonomous, administrative Hybrid Cloud
infrastructures are more vulnerable and prone to security
risks
• Network based IPS and host based IPS adopts traditional
Firewall
• Today’s malicious code, worms, network attacks on hybrid
cloud servers
ICCCI, Wuhan, China October 13th-15th 7
Motivation (Cont.)
Limitation?
Limited port & unrealizable single point defense
Ineffective packet filtration in emerging HTTP traffic
Security Breaches, Trojan & Cyber attacks
Larger industry management
ICCCI, Wuhan, China October 13th-15th 8
Proposed Model
ICCCI, Wuhan, China October 13th-15th 9
Fuzzy Controller  Controlling incoming and outgoing packet
Fuzzy rules providing dynamic packet filtered for Hybrid cloud
Packet filtering based on Packet utilization on the cloud server
Fuzzy
Integrated
Firewall !
Cloud Architecture
ICCCI, Wuhan, China October 13th-15th 10
Fuzzified Firewall Model
ICCCI, Wuhan, China October 13th-15th 11
Fuzzified Firewall Model (Cont.)
Source Generation- Gaussian member function used for source
security
𝑍𝑜 =
‫׬‬𝑧
𝑧𝜇 𝑧 𝑑𝑧
‫׬‬𝑧
𝜇 𝑧 𝑑𝑧
Destination Generation- Centre of the gravity method for
destination security
𝜇 𝑆 𝑠, 𝑐, 𝜎 = 𝑒
(𝑠 −𝑐)2
2𝜎2
ICCCI, Wuhan, China October 13th-15th 12
ICCCI, Wuhan, China October 13th-15th 13
Rules & Security Levels
Source Destination Security
Low Low Insecure
Low Medium Low Security
Low Medium-High Medium Secured
Low High High Secured
Medium Low-Medium Medium Secured
Medium Low Insecure
High High High Secured
Firewall Integration
ICCCI, Wuhan, China October 13th-15th 14
• Fuzzy Security Levels based on MFC rules integrated with
Riverbed Cloud model
• Incoming packet traffic in the Hybrid cloud will pass
Fuzzified firewall logic control to get legitimate access to
the hybrid cloud
• Unauthorized traffic with lower level security of source and
destination address discarded in the model
• Evaluation and comparison with fuzzified and no firewall
scenario for traffic to web server and database server
Results Evaluation
ICCCI, Wuhan, China October 13th-15th 15
Packet filtration in fuzzy
integrated firewall scenario
representing 25% increased
response time in non-fuzzified
firewall
Results Evaluation (Cont.)
ICCCI, Wuhan, China October 13th-15th 16
10-20% easier access (more
packet sent per time) in
fuzzified firewall through
secure firewall tunnel of
packet filtration
Contribution & Conclusion
• Designed Fuzzy controller for Firewall Model
• Generated security levels for firewall operation
• Integrated security levels with Hybrid Cloud topology
• Collected HTTP traffic response in Web server
• Collected database query traffic response in Database server
• Evaluated model using no firewall, fuzzified firewall and
traditional firewall comparative result
• Effective Fuzzy Controller  better performance in larger
industry.
• Dynamic Packet monitoring and filtrering
ICCCI, Wuhan, China October 13th-15th 17
References
[1] Q. Liu, C. Weng, M. Li, and Y. Luo, “An in-vm measuring framework for increasing virtual machine security
in clouds,” Security & Privacy, IEEE, vol. 8, no. 6, pp. 56–62, 2010.
[2] J. D. Burton, Cisco security professional’s guide to secure intrusion detection systems. Syngress Publ., 2003.
[3] T. Sproull and J. Lockwood, “Wide-area hardware-accelerated intrusion prevention systems (whips),” in
Proceedings of the International Working Conference on Active Networking (IWAN), 2004, pp. 27–29.
[4] S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood, “Deep packet inspection using parallel
bloom filters,” in High performance interconnects, 2003. proceedings. 11th symposium on. IEEE, 2003, pp. 44–51.
[5] H. Kurdi, M. Enazi, and A. Al Faries, “Evaluating firewall models for hybrid clouds,” in Modelling Symposium
(EMS), 2013 European. IEEE, 2013, pp. 514–519.
[6] A. V. Dastjerdi and R. Buyya, “Compatibility-aware cloud service composition under fuzzy preferences of
users,” IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 1–13, 2014.
[7] Riverbed Modular, (accessed June 30, 2016). [Online]. Available: http://www.riverbed.com/sg/
[8] M. Sharma, H. Bansal, and A. K. Sharma, “Cloud computing: Different approach & security challenge,”
International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 1, pp. 421–424, 2012.
[9] J. Srinivas, K. V. S. Reddy, and A. M. QYSER, “Cloud computing basics,” International Journal of Advanced
Research in Computer and Communication Engineering, vol. 1, no. 5, 2012.
[10] S. Ray and A. De Sarkar, “Execution analysis of load balancing algorithms in cloud computing
environment,” International Journal on Cloud Computing: Services and Architecture (IJCCSA), vol. 2, no. 5, pp. 1–
13, 2012.
ICCCI, Wuhan, China October 13th-15th 18
Question
&
Answer !
ICCCI, Wuhan, China October 13th-15th 19
Thanks!
Asma Islam Swapna
Twitter: @AsmaSwapna
Github: @AsmaSwapna
Tech site: www.asmaswapna.github.io
ResearchGate: Asma_Swapna2
LinkedIn: asma0swapna
ICCCI, Wuhan, China October 13th-15th 20

More Related Content

What's hot

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
 
Dotnet 2015 2016 ieee project list-(v)_with abstract
Dotnet 2015 2016 ieee project list-(v)_with abstractDotnet 2015 2016 ieee project list-(v)_with abstract
Dotnet 2015 2016 ieee project list-(v)_with abstract
S3 Infotech IEEE Projects
 
The Difference Impact on QoS Parameters between the IPSEC and L2TP
The Difference Impact on QoS Parameters between the IPSEC and L2TPThe Difference Impact on QoS Parameters between the IPSEC and L2TP
The Difference Impact on QoS Parameters between the IPSEC and L2TP
AM Publications
 
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Ericsson
 
A distributed fault intrusion tolerant sensor
A distributed fault intrusion tolerant sensorA distributed fault intrusion tolerant sensor
A distributed fault intrusion tolerant sensor
IMPULSE_TECHNOLOGY
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 

What's hot (20)

Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
 
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
18
1818
18
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
Dotnet 2015 2016 ieee project list-(v)_with abstract
Dotnet 2015 2016 ieee project list-(v)_with abstractDotnet 2015 2016 ieee project list-(v)_with abstract
Dotnet 2015 2016 ieee project list-(v)_with abstract
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
The Difference Impact on QoS Parameters between the IPSEC and L2TP
The Difference Impact on QoS Parameters between the IPSEC and L2TPThe Difference Impact on QoS Parameters between the IPSEC and L2TP
The Difference Impact on QoS Parameters between the IPSEC and L2TP
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wireless
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
 
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
 
A distributed fault intrusion tolerant sensor
A distributed fault intrusion tolerant sensorA distributed fault intrusion tolerant sensor
A distributed fault intrusion tolerant sensor
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
Secry poster
Secry posterSecry poster
Secry poster
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
 

Similar to ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud Based on Packet Utilization

Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
IJERA Editor
 
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
Awais Shibli
 

Similar to ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud Based on Packet Utilization (20)

Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
Transmission Clustering Method for Wireless Sensor using Compressive Sensing ...
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETS
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
An4201262267
An4201262267An4201262267
An4201262267
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
 
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
 
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
 
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
ICCES_2016_Security Analysis of Software Defined Wireless Network Monitoring ...
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
Security Aspects of the Information Centric Networks Model
Security Aspects of the Information Centric Networks ModelSecurity Aspects of the Information Centric Networks Model
Security Aspects of the Information Centric Networks Model
 
HINC – Harmonizing Diverse Resource Information Across IoT, Network Functions...
HINC – Harmonizing Diverse Resource Information Across IoT, Network Functions...HINC – Harmonizing Diverse Resource Information Across IoT, Network Functions...
HINC – Harmonizing Diverse Resource Information Across IoT, Network Functions...
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Recently uploaded (20)

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud Based on Packet Utilization

  • 1. Paper ID: N117 ICCCI, Wuhan, China October 13th-15th 1 Session: Network and Application Technology
  • 2. Mawlana Bhashani Science and Technology University, Bangladesh Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud Based on Packet Utilization Asma Islam Swapna, Ziaur Rahman, Md. Habibur Rahman, Md. Akramuzzaman Dept. of Information and Communication Technology ICCCI, Wuhan, China October 13th-15th 2
  • 3. Presentation Summary Introduction Motivation Proposed Model Cloud Architecture Fuzzified Firewall Model Rules and Security Levels Results Evaluation Contribution & Conclusion References ICCCI, Wuhan, China October 13th-15th 3
  • 4. Introduction Cloud ? Distributed Service provided over Internet • Private Enterprises control access, high security • Public Users gain access to cloud easily on demand • Hybrid Integration of Public and Private Cloud ICCCI, Wuhan, China October 13th-15th 4 Source: The Age of the Customer by Jim Blasingame, 2015
  • 5. Introduction (Cont.) Hybrid Cloud Security ! Flexible data access  Intrusion Prevention System (IPS) Ex. Firewall ? Controls and filters the incoming and outgoing traffic of a system standing between the internal network and world outside ICCCI, Wuhan, China October 13th-15th 5
  • 6. Introduction (Cont.) Fuzzy System • Describe complex systems with linguistic descriptions • A control system based on fuzzy logic and operates on fuzzy controller Fuzzy Control System ICCCI, Wuhan, China October 13th-15th 6 Fuzzy Controller Process Model Control Rules ControlInput Output Source: MICHIO SUGENO , An Introductory Survey of Fuzzy Control, 1985 Error
  • 7. Motivation • Distributed, autonomous, administrative Hybrid Cloud infrastructures are more vulnerable and prone to security risks • Network based IPS and host based IPS adopts traditional Firewall • Today’s malicious code, worms, network attacks on hybrid cloud servers ICCCI, Wuhan, China October 13th-15th 7
  • 8. Motivation (Cont.) Limitation? Limited port & unrealizable single point defense Ineffective packet filtration in emerging HTTP traffic Security Breaches, Trojan & Cyber attacks Larger industry management ICCCI, Wuhan, China October 13th-15th 8
  • 9. Proposed Model ICCCI, Wuhan, China October 13th-15th 9 Fuzzy Controller  Controlling incoming and outgoing packet Fuzzy rules providing dynamic packet filtered for Hybrid cloud Packet filtering based on Packet utilization on the cloud server Fuzzy Integrated Firewall !
  • 10. Cloud Architecture ICCCI, Wuhan, China October 13th-15th 10
  • 11. Fuzzified Firewall Model ICCCI, Wuhan, China October 13th-15th 11
  • 12. Fuzzified Firewall Model (Cont.) Source Generation- Gaussian member function used for source security 𝑍𝑜 = ‫׬‬𝑧 𝑧𝜇 𝑧 𝑑𝑧 ‫׬‬𝑧 𝜇 𝑧 𝑑𝑧 Destination Generation- Centre of the gravity method for destination security 𝜇 𝑆 𝑠, 𝑐, 𝜎 = 𝑒 (𝑠 −𝑐)2 2𝜎2 ICCCI, Wuhan, China October 13th-15th 12
  • 13. ICCCI, Wuhan, China October 13th-15th 13 Rules & Security Levels Source Destination Security Low Low Insecure Low Medium Low Security Low Medium-High Medium Secured Low High High Secured Medium Low-Medium Medium Secured Medium Low Insecure High High High Secured
  • 14. Firewall Integration ICCCI, Wuhan, China October 13th-15th 14 • Fuzzy Security Levels based on MFC rules integrated with Riverbed Cloud model • Incoming packet traffic in the Hybrid cloud will pass Fuzzified firewall logic control to get legitimate access to the hybrid cloud • Unauthorized traffic with lower level security of source and destination address discarded in the model • Evaluation and comparison with fuzzified and no firewall scenario for traffic to web server and database server
  • 15. Results Evaluation ICCCI, Wuhan, China October 13th-15th 15 Packet filtration in fuzzy integrated firewall scenario representing 25% increased response time in non-fuzzified firewall
  • 16. Results Evaluation (Cont.) ICCCI, Wuhan, China October 13th-15th 16 10-20% easier access (more packet sent per time) in fuzzified firewall through secure firewall tunnel of packet filtration
  • 17. Contribution & Conclusion • Designed Fuzzy controller for Firewall Model • Generated security levels for firewall operation • Integrated security levels with Hybrid Cloud topology • Collected HTTP traffic response in Web server • Collected database query traffic response in Database server • Evaluated model using no firewall, fuzzified firewall and traditional firewall comparative result • Effective Fuzzy Controller  better performance in larger industry. • Dynamic Packet monitoring and filtrering ICCCI, Wuhan, China October 13th-15th 17
  • 18. References [1] Q. Liu, C. Weng, M. Li, and Y. Luo, “An in-vm measuring framework for increasing virtual machine security in clouds,” Security & Privacy, IEEE, vol. 8, no. 6, pp. 56–62, 2010. [2] J. D. Burton, Cisco security professional’s guide to secure intrusion detection systems. Syngress Publ., 2003. [3] T. Sproull and J. Lockwood, “Wide-area hardware-accelerated intrusion prevention systems (whips),” in Proceedings of the International Working Conference on Active Networking (IWAN), 2004, pp. 27–29. [4] S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood, “Deep packet inspection using parallel bloom filters,” in High performance interconnects, 2003. proceedings. 11th symposium on. IEEE, 2003, pp. 44–51. [5] H. Kurdi, M. Enazi, and A. Al Faries, “Evaluating firewall models for hybrid clouds,” in Modelling Symposium (EMS), 2013 European. IEEE, 2013, pp. 514–519. [6] A. V. Dastjerdi and R. Buyya, “Compatibility-aware cloud service composition under fuzzy preferences of users,” IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 1–13, 2014. [7] Riverbed Modular, (accessed June 30, 2016). [Online]. Available: http://www.riverbed.com/sg/ [8] M. Sharma, H. Bansal, and A. K. Sharma, “Cloud computing: Different approach & security challenge,” International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 1, pp. 421–424, 2012. [9] J. Srinivas, K. V. S. Reddy, and A. M. QYSER, “Cloud computing basics,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 5, 2012. [10] S. Ray and A. De Sarkar, “Execution analysis of load balancing algorithms in cloud computing environment,” International Journal on Cloud Computing: Services and Architecture (IJCCSA), vol. 2, no. 5, pp. 1– 13, 2012. ICCCI, Wuhan, China October 13th-15th 18
  • 19. Question & Answer ! ICCCI, Wuhan, China October 13th-15th 19
  • 20. Thanks! Asma Islam Swapna Twitter: @AsmaSwapna Github: @AsmaSwapna Tech site: www.asmaswapna.github.io ResearchGate: Asma_Swapna2 LinkedIn: asma0swapna ICCCI, Wuhan, China October 13th-15th 20