This document proposes an access control model for virtual machine security called VBAC. It introduces elements like subjects, objects, access characteristics, security levels, and conflict sets. It improves the BLP model by adding trusted subjects and controlling the range of security levels. The model combines BLP, CW, and PCW policies. Rules are defined for access requests between VMs and resources based on these policies. Experimental results show the model's effectiveness in safely controlling resource and event behaviors in virtual machines.
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSIJNSA Journal
DDoS has a variety of types of mixed attacks. Botnet attackers can chain different types of DDoS attacks to confuse cybersecurity defenders. In this article, the attack type can be represented as the state of the model. Considering the attack type, we use this model to calculate the final attack probability. The final attack probability is then converted into one prediction vector, and the incoming attacks can be detected early before IDS issues an alert. The experiment results have shown that the prediction model that can make multi-vector DDoS detection and analysis easier.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The emerging mobile technology has brought revolutionized changes in the computer era. One such technology of networking is Mobile Ad hoc Networks (MANETS), where the mobility and infrastructure less of the nodes takes predominant roles. These features make MANETS more vulnerable to attacks. As the research continues several aspects can be explored in this area. At the very first it can be the problem of how to make the cross layer detection of attacks more efficient and work well. Since every layer in the network deals with different type of attacks, a possible viewpoint to those attack scenarios can be presented so that it can be extended in the later part. It becomes necessary to figure out the security solution architecture if there are different detection results generated by different layers. Secondly, there
should be a measure of the network metrics to show increased performance. The paper presents such a defensive mechanism cross layered architecture which strives to identify and correct misbehaviour in MANETS especially with respect to routing layer. The evaluation of the proposed solution is also given with results obtained to show the performance of the network.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...theijes
Software weaknesses in design, architecture, code and deployment have led to software vulnerability exploited by the perpetrators. Although counter measure tools have been developed such as patch management systems, firewalls and antivirus, but the perpetrators have advance sophisticated tools such malware with crypto-lock and crypto-wall technologies. The current counter measures technologies are based on detection and respond model or risk management framework, which are no match to the attacker’s technologies based on speed technologies such as machine generated malwares and precision or stealth technologies such as command-andcontrol node malwares. Although lots of ink has been poured on advances in measuring and preventing software weakness on the detection and respond concept,this study is motivated to explore the state-of-art advances specifically on the novel concept of Continuous Trust Restoration (CTR). The Continuous Trust Restoration is a process of breaking down attacker’s activities kill chain and restoring the system trust. The CTR concept deploys speed, precision and stealth technologies on random route mutation, random host mutation, hypervisors, trust boot, software identities and software define infrastructure. Moreover, to deploy these technologies the study further explores a common security architectural framework with software metrics such as CVE (Common Vulnerability and Exposure), CWE (Common Weakness Enumeration), CVSS (Common Vulnerability Scoring System), CWSS (Common Weakness Scoring System), and CAPEC (Common Attack Pattern Enumeration and Classification). Finally, the study recommends a software security counter measures research paradigm shift from the current detection and respond models to Continuous Trust Restoration concept and from risk management frameworks to a Common Security Architectural Framework.
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSIJNSA Journal
DDoS has a variety of types of mixed attacks. Botnet attackers can chain different types of DDoS attacks to confuse cybersecurity defenders. In this article, the attack type can be represented as the state of the model. Considering the attack type, we use this model to calculate the final attack probability. The final attack probability is then converted into one prediction vector, and the incoming attacks can be detected early before IDS issues an alert. The experiment results have shown that the prediction model that can make multi-vector DDoS detection and analysis easier.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The emerging mobile technology has brought revolutionized changes in the computer era. One such technology of networking is Mobile Ad hoc Networks (MANETS), where the mobility and infrastructure less of the nodes takes predominant roles. These features make MANETS more vulnerable to attacks. As the research continues several aspects can be explored in this area. At the very first it can be the problem of how to make the cross layer detection of attacks more efficient and work well. Since every layer in the network deals with different type of attacks, a possible viewpoint to those attack scenarios can be presented so that it can be extended in the later part. It becomes necessary to figure out the security solution architecture if there are different detection results generated by different layers. Secondly, there
should be a measure of the network metrics to show increased performance. The paper presents such a defensive mechanism cross layered architecture which strives to identify and correct misbehaviour in MANETS especially with respect to routing layer. The evaluation of the proposed solution is also given with results obtained to show the performance of the network.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...theijes
Software weaknesses in design, architecture, code and deployment have led to software vulnerability exploited by the perpetrators. Although counter measure tools have been developed such as patch management systems, firewalls and antivirus, but the perpetrators have advance sophisticated tools such malware with crypto-lock and crypto-wall technologies. The current counter measures technologies are based on detection and respond model or risk management framework, which are no match to the attacker’s technologies based on speed technologies such as machine generated malwares and precision or stealth technologies such as command-andcontrol node malwares. Although lots of ink has been poured on advances in measuring and preventing software weakness on the detection and respond concept,this study is motivated to explore the state-of-art advances specifically on the novel concept of Continuous Trust Restoration (CTR). The Continuous Trust Restoration is a process of breaking down attacker’s activities kill chain and restoring the system trust. The CTR concept deploys speed, precision and stealth technologies on random route mutation, random host mutation, hypervisors, trust boot, software identities and software define infrastructure. Moreover, to deploy these technologies the study further explores a common security architectural framework with software metrics such as CVE (Common Vulnerability and Exposure), CWE (Common Weakness Enumeration), CVSS (Common Vulnerability Scoring System), CWSS (Common Weakness Scoring System), and CAPEC (Common Attack Pattern Enumeration and Classification). Finally, the study recommends a software security counter measures research paradigm shift from the current detection and respond models to Continuous Trust Restoration concept and from risk management frameworks to a Common Security Architectural Framework.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields ofWSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamentalroles in the security service of WSNs. This paper reviews pairwise key establishment techniquealong with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between different cluster based group key agreement protocols.
An analysis of security challenges in mobile ad hoc networkscsandit
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of
issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly
based on its own characteristics and behaviour. In addition, defeating approaches against
attacks have been evaluated in some important metrics. After analyses and evaluations, future
scopes of work have been presented
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated. The method is specified by giving its class model in UML and by
explaining the related attributes and methods. Different attacks against the network and against WCT2M deployed in the network are considered. The experimental evaluation of WCT2M involves laboratory experiments and simulations using a dedicated simulator. The evaluation focuses on efficiency of detecting and isolating the malicious nodes that implement different attack scenarios in the network and on the
method’s sensitivity to the changes in effectiveness of the security mechanisms deployed in the network nodes.
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
We would send hard copy of Journal by speed post to the address of correspondence author after online publication of paper.
We will dispatched hard copy to the author within 7 days of date of publication
Forecasting number of vulnerabilities using long short-term neural memory net...IJECEIAES
Cyber-attacks are launched through the exploitation of some existing vulnerabilities in the software, hardware, system and/or network. Machine learning algorithms can be used to forecast the number of post release vulnerabilities. Traditional neural networks work like a black box approach; hence it is unclear how reasoning is used in utilizing past data points in inferring the subsequent data points. However, the long short-term memory network (LSTM), a variant of the recurrent neural network, is able to address this limitation by introducing a lot of loops in its network to retain and utilize past data points for future calculations. Moving on from the previous finding, we further enhance the results to predict the number of vulnerabilities by developing a time series-based sequential model using a long short-term memory neural network. Specifically, this study developed a supervised machine learning based on the non-linear sequential time series forecasting model with a long short-term memory neural network to predict the number of vulnerabilities for three vendors having the highest number of vulnerabilities published in the national vulnerability database (NVD), namely microsoft, IBM and oracle. Our proposed model outperforms the existing models with a prediction result root mean squared error (RMSE) of as low as 0.072.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Cloud-Trust—a Security Assessment Model
for Infrastructure as a Service (IaaS) Clouds
Dan Gonzales, Member, IEEE, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, and Dulani Woods
Abstract—The vulnerability of cloud computing systems (CCSs) to advanced persistent threats (APTs) is a significant concern to
government and industry. We present a cloud architecture reference model that incorporates a wide range of security controls and best
practices, and a cloud security assessment model—Cloud-Trust—that estimates high level security metrics to quantify the degree of
confidentiality and integrity offered by a CCS or cloud service provider (CSP). Cloud-Trust is used to assess the security level of four
multi-tenant IaaS cloud architectures equipped with alternative cloud security controls. Results show the probability of CCS penetration
(high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops
substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens
CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud
network surveillance and discovery of live VMs.
Index Terms—Cloud computing, cyber security, advanced persistent threats, security metrics, virtual machine (VM) isolation
Ç
1 INTRODUCTION
THE flexibility and scalability of CCSs can offer signifi-cant benefits to government and private industry [1],
[2]. However, it can be difficult to transition legacy software
to the cloud [3]. Concerns have also been raised as to
whether cloud users can trust CSPs to protect cloud tenant
data and whether CCSs can prevent the unauthorized dis-
closure of sensitive or private information. The literature is
rife with studies of CCS security vulnerabilities that can be
exploited by APTs [4], [5], [6], [7].
Virtualization, the basis for most CCSs, enables CSPs to
start, stop, move, and restart computing workloads on
demand. VMs run on computing hardware that may be
shared by cloud tenants. This enables flexibility and elastic-
ity, but introduces security concerns. The security status of
a CCS depends on many factors, including security applica-
tions running on the system, the hypervisor (HV) and asso-
ciated protection measures, the design patterns used to
isolate the control plane from cloud tenants, the level of pro-
tection provided by the CSP to cloud tenant user data and
VM images, as well as other factors.
These concerns raise questions. Can the overall security
status of a CCS or a CSP offering be assessed using a frame-
work that addresses the unique vulnerabilities of CCSs and
can such assessments be applied to alternative CCS architec-
tures and CSP offerings in an unbiased way? The federal
government has issued security controls that CSPs must
implement to obtain FEDRAMP CCS security certification [8]
that are based on Na ...
Survey on cloud computing security techniqueseSAT Journals
Abstract Cloud computing is one of the emerging technology in computer science field. It provides various services and resources, still enterprises are disinclined to invest their business in cloud computing. It is because of security issues it has. There are different service models in cloud computing and threats to security also have different. The characteristics that are must be ensured while thinking about data security in cloud computing are integrity, availability and confidentiality. In this paper we are surveying some of the Intrusion Detection and Prevention Systems (IDPS) and comparing them regarding their ability to provide data security. Keywords— Cloud Security, cloud computing, data security, IDPS
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields ofWSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamentalroles in the security service of WSNs. This paper reviews pairwise key establishment techniquealong with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between different cluster based group key agreement protocols.
An analysis of security challenges in mobile ad hoc networkscsandit
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of
issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly
based on its own characteristics and behaviour. In addition, defeating approaches against
attacks have been evaluated in some important metrics. After analyses and evaluations, future
scopes of work have been presented
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated. The method is specified by giving its class model in UML and by
explaining the related attributes and methods. Different attacks against the network and against WCT2M deployed in the network are considered. The experimental evaluation of WCT2M involves laboratory experiments and simulations using a dedicated simulator. The evaluation focuses on efficiency of detecting and isolating the malicious nodes that implement different attack scenarios in the network and on the
method’s sensitivity to the changes in effectiveness of the security mechanisms deployed in the network nodes.
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
We would send hard copy of Journal by speed post to the address of correspondence author after online publication of paper.
We will dispatched hard copy to the author within 7 days of date of publication
Forecasting number of vulnerabilities using long short-term neural memory net...IJECEIAES
Cyber-attacks are launched through the exploitation of some existing vulnerabilities in the software, hardware, system and/or network. Machine learning algorithms can be used to forecast the number of post release vulnerabilities. Traditional neural networks work like a black box approach; hence it is unclear how reasoning is used in utilizing past data points in inferring the subsequent data points. However, the long short-term memory network (LSTM), a variant of the recurrent neural network, is able to address this limitation by introducing a lot of loops in its network to retain and utilize past data points for future calculations. Moving on from the previous finding, we further enhance the results to predict the number of vulnerabilities by developing a time series-based sequential model using a long short-term memory neural network. Specifically, this study developed a supervised machine learning based on the non-linear sequential time series forecasting model with a long short-term memory neural network to predict the number of vulnerabilities for three vendors having the highest number of vulnerabilities published in the national vulnerability database (NVD), namely microsoft, IBM and oracle. Our proposed model outperforms the existing models with a prediction result root mean squared error (RMSE) of as low as 0.072.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Cloud-Trust—a Security Assessment Model
for Infrastructure as a Service (IaaS) Clouds
Dan Gonzales, Member, IEEE, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, and Dulani Woods
Abstract—The vulnerability of cloud computing systems (CCSs) to advanced persistent threats (APTs) is a significant concern to
government and industry. We present a cloud architecture reference model that incorporates a wide range of security controls and best
practices, and a cloud security assessment model—Cloud-Trust—that estimates high level security metrics to quantify the degree of
confidentiality and integrity offered by a CCS or cloud service provider (CSP). Cloud-Trust is used to assess the security level of four
multi-tenant IaaS cloud architectures equipped with alternative cloud security controls. Results show the probability of CCS penetration
(high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops
substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens
CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud
network surveillance and discovery of live VMs.
Index Terms—Cloud computing, cyber security, advanced persistent threats, security metrics, virtual machine (VM) isolation
Ç
1 INTRODUCTION
THE flexibility and scalability of CCSs can offer signifi-cant benefits to government and private industry [1],
[2]. However, it can be difficult to transition legacy software
to the cloud [3]. Concerns have also been raised as to
whether cloud users can trust CSPs to protect cloud tenant
data and whether CCSs can prevent the unauthorized dis-
closure of sensitive or private information. The literature is
rife with studies of CCS security vulnerabilities that can be
exploited by APTs [4], [5], [6], [7].
Virtualization, the basis for most CCSs, enables CSPs to
start, stop, move, and restart computing workloads on
demand. VMs run on computing hardware that may be
shared by cloud tenants. This enables flexibility and elastic-
ity, but introduces security concerns. The security status of
a CCS depends on many factors, including security applica-
tions running on the system, the hypervisor (HV) and asso-
ciated protection measures, the design patterns used to
isolate the control plane from cloud tenants, the level of pro-
tection provided by the CSP to cloud tenant user data and
VM images, as well as other factors.
These concerns raise questions. Can the overall security
status of a CCS or a CSP offering be assessed using a frame-
work that addresses the unique vulnerabilities of CCSs and
can such assessments be applied to alternative CCS architec-
tures and CSP offerings in an unbiased way? The federal
government has issued security controls that CSPs must
implement to obtain FEDRAMP CCS security certification [8]
that are based on Na ...
Survey on cloud computing security techniqueseSAT Journals
Abstract Cloud computing is one of the emerging technology in computer science field. It provides various services and resources, still enterprises are disinclined to invest their business in cloud computing. It is because of security issues it has. There are different service models in cloud computing and threats to security also have different. The characteristics that are must be ensured while thinking about data security in cloud computing are integrity, availability and confidentiality. In this paper we are surveying some of the Intrusion Detection and Prevention Systems (IDPS) and comparing them regarding their ability to provide data security. Keywords— Cloud Security, cloud computing, data security, IDPS
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
Bit-Exchange Encryption is the cryptographic conducting tool to assurance data owners enduring control
above their data in public cloud storage. The earlier ABE plans include one and only power (Authority) to
keep up the entire trait (Key) set, which can carry a solitary (single) point bottleneck on both safety
and execution. In this way, some multi- power (Multi-Authority) plans are proposed, in which various powers
independently keep up disjoint attribute subsets. In any case, the single-point bottleneck issue stays unsolved.
In this paper, from another point of view, we conduct a threshold multi-authority CP- ABE access control
plan for open distributed storage, named TMACS, in which various powers together deal with a uniform
characteristic set. In [9] TMACS, taking advantage of (t; n) limit mystery sharing, the expert (Master) key can
be shared among numerous powers, and a legitimate client can produce his/her mystery (Private) key by
cooperating with any t powers. Security and execution investigation results demonstrate that system is not just
undeniable secure when not as much as t powers are traded off, additionally dynamic when no not as a great
deal as t powers are alive in the framework. Besides, by proficiently joining the customary multi-power plan
with system, we build hybrid one, which fulfils the attributes originating from various authorities and
accomplishing security.
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING IJNSA Journal
The use of mobile devices is common among people and something essential these days. These devices have limited resources which makes it critical to provide security without compromising user ergonomics, given the large number of cyberattacks that occur. This work proposes a context-aware security mechanism for Mobile Cloud Computing providing a security level of device data privacy from the analysis of the attributes of the network that is connected, available level of RAM, CPU, and battery at the time of communication. of data with the cloud. In addition, Transport Layer Security (TLS) technology is used to create a secure channel for sending data between the client and the server and implement the analysis of the mobile device context using Fuzzy logic. The impact of the proposed mechanism on mobile device performance was measured through stress tests. The proposed mechanism had a superior performance of 38% in the number of executions, 10% of memory, and 0.6% of CPU about the use of a single type of predefined symmetric algorithm for private network environment.
Using Virtualization Technique to Increase Security and Reduce Energy Consump...IJORCS
An approach has been presented in this paper in order to generate a secure environment on internet Based Virtual Computing platform and also to reduce energy consumption in green cloud computing. The proposed approach constantly checks the accuracy of stored data by means of a central control service inside the network environment and also checks system security through isolating single virtual machines using a common virtual environment. This approach has been simulated on two types of Virtual Machine Manager (VMM) Quick EMUlator (Qemu), HVM (Hardware Virtual Machine) Xen and outputs of the simulation in VMInsight show that when service is getting singly used, the overhead of its performance will be increased. As a secure system, the proposed approach is able to recognize malicious behaviors and assure service security by means of operational integrity measurement. Moreover, the rate of system efficiency has been evaluated according to the amount of energy consumption on five applications (Defragmentation, Compression, Linux Boot Decompression and Kernel Boot). Therefore, this has been resulted that to secure multi-tenant environment, managers and supervisors should independently install a security monitoring system for each Virtual Machines (VMs) which will come up to have the management heavy workload of. While the proposed approach, can respond to all VM’s with just one virtual machine as a supervisor.
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
In this research work an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) will be implemented to detect and prevent critical networks infrastructure from cyber-attacks. To strengthen network security and improve the network's active defense intrusion detection capabilities, this project will consist of intrusion detection system using honey token based encrypted pointers and intrusion prevention system which based on the mixed interactive honeypot. The Intrusion Detection System (IDS) is based on the novel approach of Honey Token based Encrypted Pointers. This honey token inside the frame will serve as a trap for the attacker. All nodes operating within the working domain of critical infrastructure network are divided into four different pools. This division is based per their computational power and level of vulnerability. These pools are provided with different levels of security measures within the network. IDS use different number of Honey Tokens (HT) per frame for every different pool e.g. Pool-A contains 4 HT/frame, Pool-B contains 3 HT/frame, Pool-C contains 2 HT/frame and Pool-D contain 1 HT/frame. Moreover, every pool uses different types of encryption schemes (AES-128,192,256). Our critical infrastructure network of 64 nodes is under the umbrella of unified security provided by this single Network Intrusion Detection System (NIDS). After the design phase of IDS, we analyze the performance of IDS in terms of True Positives (TP) and False Negatives (FN). Finally, we test these IDS through Network Penetration Testing (NPT) phase. The detection rate depends on the number of honey tokens per frame. Our proposed IDS are a scalable solution and it can be implemented for any number of nodes in critical infrastructure network. However, in case of Intrusion Prevention System (IPS) we use Virtual honeypot technology which is the best active prevention technology among all honeypot technologies. By using the original operating system and virtual technology, the honeypot lures attackers in a pre-arranged manner, analyzes and audits various attacking behavior, tracks the attack source, obtains evidence, and finds effective solutions.
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...Shakas Technologies
Cyber attack Correlation and Mitigation for Distribution Systems via Machine Learning.
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Describe briefly the OSI Reference model and its relevance to computer security. [4 Marks]
• Ans 1: The Open System Interconnection Model (OSI) is a standardized framework for describing how computers communicate with each other over a network system. The OSI model also conceptualizes how data flows through a stack of seven layers, beginning with the physical layer and continuing through the datalink, network, transport, session, presentation, and finally the application layer (Simoneau, 2006)
Cloud data security and various cryptographic algorithms IJECEIAES
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
The Indo-American Journal of Agricultural and Veterinary Sciences is an online international journal published quarterly. It is a peer-reviewed journal that focuses on disseminating high-quality original research work, reviews, and short communications of the publishable paper.
Migration of Virtual Machine to improve the Security in Cloud Computing IJECEIAES
Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation of a particular computer system. In cloud computing, virtual machine migration is a useful tool for migrating operating system instances across multiple physical machines. It is used to load balancing, fault management, low-level system maintenance and reduce energy consumption. Virtual machine (VM) migration is a powerful management technique that gives data center operators the ability to adapt the placement of VMs in order to better satisfy performance objectives, improve resource utilization and communication locality, achieve fault tolerance, reduce energy consumption, and facilitate system maintenance activities. In the migration based security approach, proposed the placement of VMs can make enormous difference in terms of security levels. On the bases of survivability analysis of VMs and Discrete Time Markov Chain (DTMC) analysis, we design an algorithm that generates a secure placement arrangement that the guest VMs can moves before succeeds the attack.
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
Cloud computing enables users to utilize the services of computing resources. Now days computing resources in mobile applications are being delivered with cloud computing. As there is a growing need for new mobile applications, usage of cloud computing can not be overlooked. Cloud service providers offers the services for the data request in a remote server. Virtualization aspect of cloud computing in mobile applications felicitates better utilization of resources. The industry needs to address the foremost security risk in the underlying technology. The cloud computing environment in mobile applications aggravated with various security problems. This paper addresses challenges in securing data in cloud for mobile Cloud computing and few mechanisms to overcome.
Similar to AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY (20)
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
2. 134 Computer Science & Information Technology (CS & IT)
The information leakage can happen in the following two situations: (1) The attackers transmit
data through covert channels, such as using the time delay between cache miss detection in the
CPUs which share the same cache, such attacks usually have some alliance relations, they achieve
key data transmission by using the system holes through consultations. (2) The attackers use the
resource shared between different VMs, such as shared memory or CPU, to steal information.
This kind of data leakage will not cause damage to the system or data to the virtual machine
system, but if the VM running in upper layer is a server which contains critical data, the leakage
of such information can bring serious risks.
Usually the operation of the virtual machine is controlled by the Virtual Machine Monitor
(VMM, also known as Hypervisor). Secure hypervisor can realize the resource isolation, data
security, communication security and integrity of their code. Representative work is the IBM’s
hypervisor architecture: sHype [8]. It uses security model to control system processes, memory
access and isolation of internal resources through access control module (ACM). But when the
Chinese Wall policy is adopted to prevent the hidden stream passing through different virtual
machines, sHype statically divide the different conflict resources into different access area, as a
result the resource utilization is reduced [9]. Cheng et al proposed a Chinese Wall model with a
priority (Prioritized Chinese Wall, PCW) [10] to reduce the risk of the hidden information flow in
a virtual machine system. Based on the previous work, especially sHype and PCW architecture,
we propose an access control model suitable to virtual machine environment, and we also verify
the model in Xen.
The main contributions of this paper are:
1. An access control security model of virtual machines is proposed, it introduces the BLP(Bell-
lapadula) model on the basis of the PCW model to control the memory sharing among virtual
machines and maintain the CW model to manage the virtual machine start.
2. The BLP model is improved, the control range of trusted subjects and security level are added.
3. We implement a prototype for the security model, three strategies are used to realize the
security model. Results show the effectiveness of the proposed model.
2. MODEL ANALYSIS
2.1 Analysis of virtual machine access control model
In 2005 IBM proposed sHype, which is a security architecture used to control the information
flow between the operating systems that share the same hardware platform and it can achieve the
controlled sharing of resources between virtual machines. Xen virtual machines adopted the core
idea of sHype that it set an ACM module in the virtual layer and implemented two security
policies [11]: Chinese Wall (CW) [12] and Simple Type Enforcement (STE). Its main objectives
are: (1) Management of the communication between two virtual machines in the same system; (2)
Management of the hardware resources that virtual machine can access; (3) Multiple virtual
machines in the same conflict set of interest cannot be run at the same time, this reduced the
occurrence of the convert channel. While the CW strategy can prevent virtual machines have
conflict of interest running at the same time in the same VMM, the STE policies can control
whether communications can happen between different virtual machines and the hardware
resources virtual machines can access.
3. Computer Science & Information Technology (CS & IT) 135
CW and STE both have significant advantages on the control and distribution of resources, which
is the main reason why Mandatory Access Control (MAC) method can be well applied in VMs.
However, CW and STE also have many limitations, which mainly reflected in that they cannot
prevent the covert channel; an attacker can easily take advantage of shared resources or third-
party virtual machine for data transfer. Ge Cheng, Hai Jin et al proposed the PCW strategy model
[10], which is based on the Chinese Wall security policy, but it is also different with the sHype’s
CW strategy, i.e., the relationship of conflict sets is no longer static, but can be extented along
with the flow of information. This model can prevent the convert channel effectively, however,
the following defects also existed:
1. PCW model is so strict that it greatly reduced the resource utilization of virtual machine, which
is contrary to the original goal of virtual machine design, and there is also a possibility of
system deadlock that a virtual machine may never get a chance to run because of dynamic
conflict set of interest unless you restart the system.
2. PCW is only limited to isolated control of virtual machine resource allocation, that is, either
access or refused, but this does not match the actual requirements. Virtual machine is
equivalent to a computer group, there are two conflicts between the virtual machines in this
group, one is the resource request and the other is access rights. But restrictions on access
rights cannot be strictly isolated. For example, FTP service, when there is a conflict between
the host and client access rights, the host can set the access rights of the client, limit the client’s
read and write permissions so that client can operate within its scope, but PCW can only permit
or deny which cannot fit this demand.
2.2 BLP model and its improvement
From above, we can see that the CW and PCW conflict sets cannot fully meet the security needs
of the virtual machine. In order to solve the problem from the security of the whole system, we
introduce another model: BLP multi-level security model. In our model, BLP will be used to
control the memory sharing of virtual machine, it also manage the CW model to control the start
of virtual machine. Considering the PCW can effectively prevent the covert channel threats
brought by the communication and CPU resource sharing of virtual machine. Therefore, CW,
PCW and BLP will simultaneously exist in our model. We have made some improvements on the
BLP to better meet the system requirements.
BLP model was proposed for the U.S. military in the 1970s to solve the information security and
confidentiality problems of time-division system, the model is mainly used to prevent
confidential information to be accessed by unauthorized subject [13]. In BLP model, set ( ) sL s l= as
security permissions of subject s , set ( ) ol o l= as sensitivity level of objecto and for all the
security levels il ( ……, 10,1, 1, i ii k l l += − < ),there are three access and control rules:
1. Independent safety features: the subject s has discretionary access permissions on the
object o .
2. Simple safety conditions: the subject s can perform read operation on object o , if and
only if o sl l< , s has autonomous read permissions on o .
4. 136 Computer Science & Information Technology (CS & IT)
3. *-properties: subject s can perform write operation on objecto , if and only if o sl l> , s
have autonomous read permissions ono .
Considering the special features of VMs, we made the following improvements on BLP:
1. The trusted subject is added
BLP model’s strict confidentiality brings the system a lot of restrictions, e.g., any virtual machine
can communicate only based on the security level, however, some special virtual machines need
to exchange information unconditionally. Therefore, we add a trusted subject, which can go
beyond the BLP model’s strict security level system and exchange information with the target
object. We make a limitation that trusted subject cannot exchange malicious objects with other
objects, i.e., a trusted subject cannot be served as malicious object transfer medium.
2. Control of the security level’s range
In the conventional implementation of BLP axiom, a subject’s sensitive level is fixed in its entire
life cycle. The system set a security level for each VM, but it does not mean that all the virtual
machine of higher security level have read permission on those of lower security level, because it
does not meet the actual service’s demand. Therefore, there is a need to set a zone classification
for the security level. There are multi-level security data streams in a security zone, while it does
not exist in the different zones. In this way the flow of data between the virtual machines in
different security levels can be controlled according to system requirements.
3. MODEL DESIGN AND SECURITY ANALYSIS
3.1 Model Design
In our model we assume that the security levels of all the virtual machines are in the same zone,
meanwhile virtual machines have independent access rights to the resource allocated by the
system, that is, the subject and object both meet the discretionary access permissions. We present
the Virtual machine Based Access Control model (VBAC), which is defined as follows:
1. Model elements
• Subject and object elements
Subject set 1 2:{ , , , }mS s s s…… , defined as an object which sends access request, Object set
1 2:{ , , , }mO o o o…… , defined as an object is accessed. In the virtual machine system, both VM and
system resources are likely to become one of subject or objects;
Trusted subject set: ( ):{ | }T s s s is trusted and s S∈ ;
• Access characteristic and request decision sequence
Access characteristic (AC) contains memory read and write:{ , | }read read write , memory transfer:
{ }mem tranfer− , VM label:{ , }addlabel rmlabel , resource apply and release: { , }apply release , VM
create and destroy:{ , }create destroy , VM start and stop:{ , }start stop , communication apply and
5. Computer Science & Information Technology (CS & IT) 137
release: { , }com apply com release− − , security level adjustment:
{ ( )| sec }u ulevel L L is the new urity level ;
The state set of the virtual machine:State(o){running,stop,sleep};
System security level F: security category, f1 and f2 represent subject’s and object’s security
level respectively, f3 and f4 represent category;
Request set :R S O X+
× × , { }S S φ+
= ∪ , { }X AC Fφ= ∪ ∪ , request element is :{ | , 0}i i iR R R R i∈ ≥ ;
Security Decision set D:{yes,no,error,?}, its element is :{ | , 0}j j jD D D D j∈ ≥ , which is the decision
of request jR ;
Request sequence : T
X R , which represents the request sequence at different time, request
element is x, tx represent the request at time t;
Decision sequence : T
Y D , it’s the decision sequence set which security policy responses to the
request sequence, decision element is denoted as y, ty represents the decision at time t;
• The conflicts set and access matrix
The conflicts interest set: CIS(o), the data set which has interest conflict with object o, element
CISt(o) represents the conflict relation set of o at time t; conflict zone: RC, all the elements in a
conflict set belong to the corresponding conflict zone, that is ( ),s CIS s s RC∀ ∈ ∈ ; if s is not included
in any conflict set, ` , ( `)s S s CIS s¬
∃ ∈ ∈ , it’s the same to say s belongs to no conflict zone, then define
s RC∉ ;
System access matrix A: (S×O), it’s used to record the access memory of the subjects and
objects controlled by the system, matrix element ( , )t i jA s o represents the access matrix at time t,
{ 1,0,1}tA → − ,1 represents that is had accessed oj, 0 represents that it’s still not decided and will
change with decision ( , , )t i jD s o x , -1 represents that it cannot be accessed .A0 is the initial access
matrix.
• System state and system
Present access set: ( )P S O AC× × ;
System state V: ( )P S O AC A F× × × × ;
State sequence : T
Z V is the state sequence, state element is denoted as z, tz represent the state of
time t; 0z is the initial state, usually regard initial state of system as safe.
6. 138 Computer Science & Information Technology (CS & IT)
State shift: W R D V V⊆ × × × represent a state shift to another state after request and decide;
0: ( , , , )SYM R D W z X Y Z⊆ × ×∑ ,( , , )x y z SYM∈ , only at any time t T∈ ( 1, , , )t t t tx y z z W− ∈ ;
2. Model rules
To implement the security control of the system, the subjects and objects of the virtual machine
system is defined as the safety rules below. In B1, B4, B5, B6, B7, B8, B9, and B10, subjects and
objects are VMs, but in other rules the subjects are virtual machine and the objects are the
hardware resources.
Rule B1: The subject add a label or remove a label , ( , , )tR s o addlabel | ( , , )tR s o rmlabel
( , , )tR s o addlabel | ( , , )tR s o rmlabel is permitted only when ( )s T s∈ , that is, the subject is a trusted
subject.
Rule B2: The subjects apply for resource, ( , , )tR s o apply
( , , )tR s o apply is permitted only when the following condition is satisfied.
1. ( , ) 1tA s o ≠ , s had never accessed o before t;
2. There’s no other subject is accessing o at t;
3. 1' : ( ', ) 1 ' ( ): ( ', ') 1t t ts s A s o o CIS o A s o+∀ ≠ = ∧∀ ∈ ≠ , the subjects had accessed o will not be
conflicted with s.
Rule B3: Subjects release resources, ( , , )tR s o release
( , , )tR s o release is permitted only when ( )state s stop= , that is, the subject is stopped.
Rule B4: Subjects create and destroy the objects, ( , , | )tR s o create destroy
( , , | )tR s o create destroy is permitted only when ( )s T s∈ ;
Rule B5: Subjects start the objects, ( , , )tR s o start
( , , )tR s o start is permitted only when: ( )s T s∈ and ` D ( , `, ) 1o t o o apply∀ =, , that is, all the
resources applied by the client is permitted by Rule 2;
'| ( ( ') ) ^ ( ( ') ), ( ')s state s running state s sleep o CIS s∀ = = ∉ , the object is not conflicted with the
VMs which is running or suspended.
Rule B6:The subjects stop the objects, ( , , )tR s o stop
( , , )tR s o stop is permitted only when ( )s T s∈ .
7. Computer Science & Information Technology (CS & IT) 139
Rule B7: The subjects communicate with the objects, ( , , )tR s o com apply−
( , , )tR s o com apply− is permitted only when:
1. ||s RC o RC∉ ∉ , that is, s and o don’t belongs to any conflict set;
2. ( ) || ( )s CIS o o CIS s∉ ∉ , that is, the two sides of communication aren’t in the same conflict set.
Rule B8: The subjects release communication, ( , , )tR s o com release−
( , , )tR s o com release− is permitted only when ( , , )tD s o com apply− =1, that is, if the communicating
rules between s and o fit B7 and get permission, release communication is always permitted.
Rule B9: The subjects adjust the security level, ( , , ( ))t nR s o level L
( , , ( ))t nR s o level L is permitted only when ( )^( ( ) )s T s state o stop∈ = ,that is, s is trusted subjects and
the client is not running.
Rule B10: The subjects apply for memory transfer from the objects, ( , , )tR s o mem tranfer−
( , , )tR s o mem tranfer− is permitted only when 1 2 3 4( ( ) ( )^ ( ) ( ))||( ( ))f s f o f s f o s T s> ⊇ ∈ ; that is, the subjects
dominate the object or the subject is trusted subject.
Rule B11: The subjects only read the mapped memory, ( , , )tR s o readonly map−
( , , )tR s o readonly map− is permitted only when: 1 2 3 4( ( ) ( )^ ( ) ( ))||( ( ))f s f o f s f o s T s> ⊇ ∈ , that is, the subjects
dominate the object or the subject is trusted subject.
Rule B12: The subjects read or write the mapped memory, ( , , | )tR s o read write
( , , | )tR s o read write is permitted only when:
1 2 3 4 4 3{( ( ) ( ))^[ ( ) ( )|| ( ) ( )]}||( ( ))f s f o f s f o f s f o s T s= ⊇ ⊇ ∈ , that is, the two sides of read and write are at
the same security level.
Conflict set expansion theorem:
1. If Rt(s,o,apply) fit B2, then:
a) If 1 1 2 2( , ( )) ^ ( , ( , ) 1)ts SYM s CIS s s SYM A s o∀ ∈ ∈ ∃ ∈ = , let ( , ) 1A s o = , expand the conflict set of
2s as:
2 1 2
2 1
| ( , ) 1
( )
s s A s o
CIS s s
≠ =
= U
b) If 1 1 2 2( , ( )) ^ ( , ( , ) 1)ts SYM s CIS s s SYM A s o¬
∀ ∈ ∉ ∃ ∈ = , then only let ( , ) 1A s o = ,that is, if s is
not in any conflict set and o was never accessed by any object, we only need to modify the
access history matrix A;
8. 140 Computer Science & Information Technology (CS & IT)
(2) If ( , , )tR s o com apply− fits B7, then:
a) If ||s RC o RC∉ ∉ ( s or o doesn’t belong to any conflict set, then expand the conflict set:
( ) , ^ ( )
( ) , ^ ( )
_ , ^
s o
o s
CIS o s s RC o CIS o
CIS s o o RC s CIS s
do nothing o RC s RC
≠
≠
= ∉ ∈
= ∉ ∈
∉ ∉
U
U
b) ( )|| ( )s CIS o o CIS s∉ ∉ , if the two sides of communication aren’t in a same conflict set,
expand any of them:
( ) ( )
s o
CIS s CIS o
≠
= U
So,
1 2 1 2 2 3( , , , ),( ( , , ) 1)^( ( , , ) 1)Ns s s D s s com apply D s s com apply∃ − = − =K ^( ) ^……
1( ( , , ) 1)N ND s s com apply− − = ,will expand all conflict sets of (1 )is i N≤ ≤ :
1
2
1( )
i
i N
i
s s
CIS s s
≤ ≤
≠
= U
By symmetry and transitivity, we can be obtained that all the subjects of direct or indirect
communication will in a same conflict set, which is the previously mentioned Alliance of conflict
set.
3.2 VBAC model security analysis
In VBAC model, rule B1 to B8 of VBAC adopt the core ideas of CW’s conflict set; B9 to B12
adopt the multi-level security idea of BLP.
We assume that the initial system state is safe in a conflict of interest and secure confidentiality.
Rule B2, B3 control resource allocation, in full compliance with the idea of conflict isolation,
meet CW’s simple security features to ensure there’s no information disclosure on the resource
allocation. Rule B7, B8 control event channels between virtual machines by CW’s idea, event
channel is a technical core of the virtual machine, as semaphore mechanism of the traditional
system. Many virtual machine behaviors are based on the event channel, if the control is too
strict, the availability of the virtual machine will be affected, so the control of event channel need
to be set in accordance with the secure requirements of the system. There are a third party covert
channel in Rule B2, B3, B7, B8, the conflict set expansion theorem is proposed to solve this
problem and eliminates the third-party security risks well.
The model rules B9 B12 control the virtual machine resource sharing and communication
problems by idea of BLP, rule B10, B11, B12 meet the security features of the multi-level
security system, thus, the system conversion will limited by B9 to B12 to ensure the
confidentiality.
9. Computer Science & Information Technology (CS & IT) 141
From the model, we can better avoid information leakage caused by system resource allocation,
as well as better control of third-party covert channel of virtual machines.
4. IMPLEMENTATION AND EXPERIMENT RESULTS
In the implement, we divide the virtual machine-based access control model into three parts: the
main strategy, the second strategy, the third strategy. The secure control strategy is realized
through the cooperation of three strategies.
(1) The main strategy primary policy: It implemented the conflict set model, used core idea
of CW and is responsible for create, start and destroy of the virtual machine. The strategy
is based on virtual machine and follows VBAC model’s Rule B1, B4, B5, B6;
(2) The second strategy second policy: In Xen, resource control and event channel
management uses STE model, we also use this security model. STE adopted CW’s idea
of interest conflict set, it is responsible for application, allocation, revocation of virtual
hardware resources, and the event channel management, in the model proposed in this
paper, it will follow the VBAC model’s rule of B1, B2, B3, B7, B8, as well as the
conflict set expansion theorem;
(3) The third strategy third policy: The third strategy controls the multi-level secure
communications between virtual machines; it adopted the core idea of the BLP, and is
responsible for managing memory sharing, data transfer and other issues. It follows the
VBAC model rule B9, B10, B11, B12.
4.1 Test Results
1. Memory management test
In our experiment the PC’s physical memory is 4GB, that is, number of pages in the memory
space: 4G/4KB = 1M. Test scenarios of memory access control are as follows: create three VMs
Dom1, Dom2, Dom3, configuration information for each VM memory is: memory 512MB for
Dom1, memory 256MB for Dom2, and 256MB for Dom3.
(1) Scheme 1: test if there is conflict relationship between Dom1 and Dom2;
These two virtual machines are allocated memory space respectively. The test procedure is as
follows: ① Both Dom1 and Dom2 were not set a security type, after starting Dom1 detect the
memory space allocated by Xen; ②close Dom1, then start Dom2 and detect memory space
allocated by Xen.
We get memory allocation of Dom1 and Dom2 through Xentrace tools and debug-keys in Xm as
shown in Figure 1. In figure 1, the vertical axis represents the time axis, the horizontal axis
represents the number of pages, and experimental machine has 4GB physical memory or memory
pages 1M, so the maximum memory page number is 1048576. In the Xen virtual machine system,
Xen occupied the starting 64MB memory space, as the red region shown in the figure; after start
of the Domain0, all the other memory was managed by Domain0 and it got a memory allocation
of 131,072, as the green region shown; When start Dom1, it was allocated a memory of 65536
10. 142 Computer Science & Information Technology (CS & IT)
pages, its page space is the yellow region shown in Figure1, after closing Dom1, Dom1’s memory
page was recovered; so when starting Dom2, Domain0 allocate memory for it in-memory heap,
as the black region shown in the figure. We can conclude from the data that Dom2 and Dom1 can
share memory pages.
Fig. 1. Control of Memory resource test results
(2) Scheme 2:
Test the memory space which is allocated for the virtual machine of same conflict set.
The test procedure is as follows:Label the Dom1 with security type "A", and label the Dom2 with
"B", after switch on the Dom1, test the memory address segment assigned to Xen; ② Close
Dom1, switch on Dom2 ,examine the memory page status allocated for Dom2 .
Figure 2 shows the results of scheme 2. In the design of scheme, there are some conflict of
interests between Dom1, and Dom2.
Thus, despite Domain0 recover its memory after Dom1 is closed, the type of access has been
recorded in memory by the history array.
The memory page used by Dom1 cannot be assigned to Dom2 when allocating memory pages for
Dom2 because the conflict relationship mentioned above. The memory page used by Dom1 is
marked in yellow, page of memory allocated for Dom2 is marked in bright blue, from the
statistics, we find that there is no shared memory page in Dom1 and Dom2.
(3) Scheme 3:
Test the influence that conflict set expansion theorem may have on memory allocation. In order to
achieve the expected results, we set memory configuration of Dom1 to 512MB, the memory of
Dom2 and Dom3 to 256MB.
The test procedure is as follows: Set all the array which contain memory usage history to 0, the
Dom1 with security label "A" , Dom2 with security label "C", examine the memory address
ranges assigned to Xen after switched on Dom1; ② Close Dom1 and switch on Dom2, test status
of memory page allocated for Dom2; ③ create Dom3 which is set with security label "E" , then
close Dom2 and switch Dom , test status of memory page allocated for Dom3.
11. Computer Science & Information Technology (CS & IT) 143
Fig. 2. Result of memory resources control test in scheme 2
Three memory allocation of the test scheme 3 is shown in Figure 3. 131,072 memory pages used
by Dom1 are marked in yellow, Dom2 represent memory pages for Dom1 which is allocated by
Domain0 after Dom1 is closed; in the scheme, there are some conflict between Dom2 and Dom3,
for they had shared the same memory page. According to conflict set expansion theorem, they
had the same type of conflict. Thus memory page used by Dom1 cannot be assigned to Dom3, In
Figure3 memory allocated for Dom3 is marked in bright blue.
Fig. 3. Result of memory resources control test in scheme 3
4.2 Result analysis
From the test data and result analysis, we find the proposed security model has the following
several characteristics:
(1) High safety.
In the section about security and effectiveness in this paper, the safety of virtual machine
management, event channel, resource management and shared memory access control have been
tested. Results show that the virtual machine management control accord with the requirement of
CW set model of interest conflict; Resource management and event channel control can get the
effective control through extended definition of conflict set; the control to memory shared follows
multistage safety control rules of VBAC model which has been mentioned in this paper.
12. 144 Computer Science & Information Technology (CS & IT)
(2) Less space overhead.
In access control module, the security level and conflict set type stored in arrays after the
mapping, the size of strategy information cache array is decided by security type number M and
virtual machine number N. Assuming that each array element occupied 1 Byte, then the array of
strategy information will occupy M * N Bytes totally. In resource controlling, the largest
overhead comes from the memory pages. In order to reduce the cost of the space, we adopt the
Bit-map storage, which has greatly reduced the space overhead.
(3) Existence of time performance loss.
From the testing process, we can see that performance loss in access control are mainly caused by
memory allocation, because a lot of memory page need to be allocated every time when the
system starts, and each allocation will cause reading and decision of model information, thus a
certain period of time loss happened.
5. SUMMARY
Virtual machine is one of the key technologies of cloud computing, but there exist many attacks
to the virtual machine. According to the internal safety problems of virtual machine, we propose a
novel access control model which is suitable for virtual machine environment. On the basis of
PCW security model, we introduced the BLP multilevel security model, and make corresponding
improvements of BLP. The performance and space overhead are ananlyzed. The simulation
results show that the proposed model is feasible and secure.
ACKNOWLEDGMENTS
This work is supported by the Key Lab of Information Network Security, the Ministry of Public
Security and Information Security Special fund of National Development and Reform
Commission (Project name: Development of Security test service capabilities in wireless
intelligent terminals).
REFERENCES
[1] Feng DG, Zhang M, Zhang Y, Xu Z. Study on cloud computing security[J]. Journal of Software,
2011,22(1):71-83.
[2] Wang, Z.,X.X. Jiang. HyperSafe: A Lightweight Approach to Provide Lifetime Hyper-visor Control-
Flow Integrity[C]. 2010 IEEE Symposium on Security and Privacy, 2010:380-395.
[3] Salaun, M. Practical overview of a Xen covert channel[J]. Journal in Computer Virology, 2010, 6(4):
317-328.
[4] Liu, Q., G.H. Wang, C.L. Weng, et al. A Mandatory Access Control Framework in Vir-tual Machine
System with Respect to Multi-level Security II: Implementation[J]. China Communications, 2011,
8(2): 86-94.
[5] Ranjith, P., C. Priya,K. Shalini. On covert channels between virtual machines[J]. Journal in Computer
Virology, 2012, 8(3): 85-97.
[6] Okamura, K.,Y. Oyama. Load-based covert channels between Xen virtual machines[C]. 25th Annual
ACM Symposium on Applied Computing, Sierre, Switzerland, 2010:173-180.
13. Computer Science & Information Technology (CS & IT) 145
[7] JingZheng, W., D. Liping, W. Yongji, et al. Identification and Evaluation of Sharing Memory Covert
Timing Channel in Xen Virtual Machines[C]. 2011 IEEE 4th Interna-tional Conference on Cloud
Computing (CLOUD 2011), Los Alamitos, CA, USA, 2011:283-91.
[8] R. Sailer, E.V., T. Jaeger, R. Perez, L. van Doorn, J. L. Griffin, and S. Berger. .sHype: Secure
Hypervisor approach to trusted virtualized systems, Yorktown Heights, NY, USA:2005.
[9] CHENG Ge, JIN Hai, ZOU De-qing, ZHAO Feng. Chinese wall model based on dy-namic
alliance[J]. Journal on Communications, 2009, 30(11): 93-100.
[10] Cheng, G., H. Jin, D.Q. Zou, et al. A Prioritized Chinese Wall Model for Managing the Covert
Information Flows in Virtual Machine Systems[M]. Proceedings of the 9th In-ternational Conference
for Young Computer Scientists, Vols 1-5, ed. G.J. Wang, et al.Los Alamitos: Ieee Computer
Soc,2008.
[11] Shi Nei, Zou Deqing, Jin hai. Xen Virtualize technology [M]. Wu han: Huazhong Uni-versity of
Science and Technology Press,2009.
[12] Foley, S.N. Building Chinese walls in standard unix(TM)[J]. Computers & Security, 1997, 16(6):
551-563.
[13] Gansen, Z.,D.W. Chadwick. On the modeling of Bell-LaPadula security policies using RBAC[C].
2008 IEEE 17th Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.,
Piscataway, NJ, USA, 2008:257-62.