5.3 Determining the Staff Member
Responsible
Once the time of a violation has been determined,
the profiles of all staff on duty at that time can be
examined. Events logged at that time identify the
staff member or members associated with the event
by means of the private key used. The events related
to the violation then indicate which staff were
involved.
5.4 Differentiating between Violations
3.2 and 3.3
Unauthorized actions, such as accessing storage, will
either come from a virtual machine in the
environment or from a management console. Access
from management consoles and virtual machines is
logged and so detectable by examination of the logs.
Other types of attacks may come from virtual
machines however, and their detection relies on
suitable logging actions. Machine copying, for
example, can be detected if the machine acts in an
unusual way. A machine profile is an appropriate
method of detecting a copy, since a machine which
has been functioning in the cloud service
environment performs particular, specified tasks
(such as those relevant to an online shop) and its
operation follows a regular pattern over a particular
block of time (one day or one week for example). A
copy of such a machine is expected to follow the
same pattern. Any departure from such a pattern
would be suspicious.
A rogue machine introduced as a new piece of
hardware as described in Section 3.3, would not
have established a usable profile with which to
compare behaviour. However, unlike the situation of
a copied machine, which would try to remain
undetected, a rogue machine would have negative
impact on other machines in its environment. In this
case, it is the profiles of the affected machines that
would detect anomalies, and the collection of these
anomalies would point to a rogue machine.
In summary, appropriate logging methods in
conjunction with staff and machine profiles enable
the cloud service provider to deal with any of the
attacks discussed in this paper, either individually or
combined. Methods of ensuring tamper-proof logs as
in (Kelsey et al. 1999) can be extended to ensuring
that profiles are also tamper-proof.
6 FUTURE WORK
Simulation of authorized and unauthorized activities
in large production domains will provide direction
for the development of efficient and accurate log-
based diagnostics in cloud environments.
The establishment of profiles for individual staff
members is extremely useful in identifying
anomalies in the individual’s behaviour which may
be indicative of suspicious behaviour. Such profiling
can be extended to sections of the cloud operation
such as a particular business process or a particular
machine or cluster of machines in order to detect a
situation which may indicate malicious behaviour.
Future work in this area might include the use of
techniques currently used to detect a denial-of-
service attack on a server from outside the firewall.
The gathering of data in an on-going automated
way for potential forensic use is a second area of
research which is worthwhile pursuing. This would
have to be done in such a way that the rights and
privacy of staff members were not violated (with
respect to all relevant laws) and also such that data
was gathered efficiently and in a manner that was
easy to access and use when needed.
The ability of a cloud customer to detect the
failure of conditions in the service level agreement
would be a useful addition to assurance of data
integrity. This idea has been proposed in several
publications, for instance, in (Simmhan, 2010) and it
is an area of interest for further work by the present
authors.
REFERENCES
Cattedu, D. and Hogben, G., editors. ‘Cloud computing
security benefits, risks and recommendations’, Nov.
2009 Report by the European Network and
Information Security Agency.
Corney, M., Mohay, G., Clark, A., R., Lopes, J. 2011.
Detection of anomalies from user profiles generated
from system logs. In Proceedings of AISC; to appear.
Dalton, C., Plaquin, D., Weidner, W., Kuhlmann, D.,
Balacheff, B. and Brown, R. 2009. Trusted virtual
platforms: A key enabler for converged client devices.
In ACM SIGOPS Operating Systems Review, vol.43,
36-43.
Gartner Inc. ‘How cloud computing will change business’
in www.businessweek.com/print/magazine/content/
09_24/b4135042942270.htm
Popa, R., Lorch, J., Molnar, D., Wang, H., Zhuang, L.
2010. Enabling security in cloud storage SLAs with
CloudProof. Microsoft report available at http://
research.microsoft.com/pubs/131137/cloudproof-msr-
tr.pdf
DEALING WITH ROGUE VIRTUAL MACHINES IN A CLOUD SERVICES ENVIRONMENT
47