The initial prototype based on the concepts and algo-
rithms presented has been validate on an electronic
archiving platform with the event specification and
detection console allocated to a dedicated virtual
machine, while the multi agent system platform
JADE has been adopted for the specification and
management of agent entrusted with the role of de-
tecting primitive events as can be seen in Figure 2.
NAGIOS plugins (
Pervilä, 2007) along with other
tailored programs where developed for the detection
of primitive events within the Infrastructure.
The initial results were very encouraging as most
of the security events of concerns provided by the
SaaS provider and consumer and specified using the
Event designer were detecting, by simulating altera-
tions and attacks targeting the archived files. Fur-
thermore, the capacity of the VM required for host-
ing the whole application (Event Designer and mul-
ti-agent detection platform) was confine to a 2 Go of
RAM and in single CPU. Nonetheless, further appli-
cations are envisaged for better appraising the effect
of deploying simultaneously a multitude of agents
for detecting and reporting events of interest.
AKNOWLEDGEMENTS
This work has been conducted in the context of the
SAINTS project, financed by the national fund of
research of the Grand Duchy of Luxembourg (FNR)
under grant number C12/IS/3988336. The authors
also thanks Maimouna Seck and Charles Hubert
Duthilleux for their work on implementing the tool.
REFERENCES
Anicic D., Rudolph S., Fodor P., Stojanovic N.: Stream
reasoning and complex event processing in ETALIS.
Semantic Web 3(4): 397-407 (2012).
Bellifemine F., Caire G, Poggi A., Rimassa G. 2008
JADE: A software framework for developing multi-
agent applications. Lessons learned. Information &
Software Technology 50(1-2): 10-21.
Carasso D. (2012) Exploring Splunk, CITO Research,
New York.
Chen Y, Paxson V, Katz RH (2010) What’s New About
Cloud Computing Security? Report EECS Depart-
ment, University of California, Berkeley,
http://www.eecs.berkeley.edu/Pubs/TechRpts
/2010/EECS-2010-5.html.
Dölitzscher F., Knahl M., Reich C., Clarke N.L. 2013
Anomaly Detection in IaaS Clouds. In proceedings of
CloudCom (1) 387-394.
Etzion O., Niblett P. 2010. Event Processing in Action.
Manning Publications Company 2010, ISBN 978-1-
935182-21-4, pp. I-XXIV, 1-360.
Lorenzoli D., Spanoudakis G. 2010 EVEREST+: Runtime
SLA Violations Prediction: In: Proceedings of the 5th
Middleware for Service-oriented Computing Work-
shop, ACM.
Luckham D. C. (2005) The power of events - an introduc-
tion to complex event processing in distributed enter-
prise systems. ACM 2005, ISBN 978-0-201-72789-0,
pp. I-XIX, 1-376.
Ganzha M, Paprzycki M. (2014): Agent-oriented compu-
ting for distributed systems and networks. J. Network
and Computer Applications 37: 45-46 (2014). McAfee
and Guardian Analytics. 2012. Dissecting. Operation
High Roller. Accessed 10 December 2014. From:
http://www.mcafee.com/us/resources/reports/rp.operat
ion-high-roller.pdf.
Nuñez D., Fernandez – Gago C., Pearson S., Felici M.
2013 A Metamodel for Measuring Accountability At-
tributes in the Cloud. In: Proceedings of the 2013
IEEE International Conference on Cloud Computing
Technology and Science (CloudCom 2013), IEEE.
Ouedraogo M., Khadraoui D., Mouratidis, H. and Dubois
E. (2012): Appraisal and reporting of security assur-
ance at operational systems level. Journal of Systems
and Software 85(1): 193-208 (2012).
Ouedraogo M, Mouratidis M (2013) Selecting a cloud
service provider in the age of cybercrime, Computers
& Security, vol.38, pp.3-13 Special issue on Cyber-
crime in the Digital Economy, Elsevier.
Ouedraogo M., Kuo C.T, Tjoa S., Preston D, Dubois E.,
Simões P., Cruz T.: Keeping an Eye on Your Security
Through Assurance Indicators. In proceedings of
SECRYPT 2014: 476-483.
Pervilä, M.A., 2007. Using Nagios to monitor faults in a
self-healing environment. In:Seminar on Self-Healing
Systems. University of Helsinki.
Rak M, Liccardo L, Aversa R 2011. A SLA-based inter-
face for security management in cloud and GRID inte-
grations. In: Proceedings of the 7
th
International. Con-
ference on Information Assurance and Security (IAS),
pp.378-383, IEEE.
Robert J. Zhang, Elizabeth A. Unger (1996) Event Speci-
fication and Detection Technical report TR CS-96-8,
1996, Kansas State University.
Sunyaev A., Schneider S. 2013. Cloud services. certifica-
tion Communication of the ACM 56(2): 33-36, ACM
digital Library.
Waltermire D., Schmidt, C., Scarfone K.
Winkler V. (2011) Securing the cloud- cloud computer.
security techniques and tactics. Syngress.
Ziring N. 2012. Specification for the Extensible Configu-
ration Checklist Description Format (XCCDF) Ver-
sion 1.2, NIST Interagency Report 7275Revision 4,
National Institute of Standards and Technology
Gaithersburg, MD 20899-89.
CLOSER2015-5thInternationalConferenceonCloudComputingandServicesScience
572