5 CONCLUSION AND
PROSPECTS
In this work, we have presented an Autonomic
Computing security system based on an Artificial
Immune System model and a Rule-based System
architecture. We have discussed how this system
provides the necessary flexibility to handle the
dynamic nature of an elastic cloud infrastructure and
the necessary robustness to ensure a security healthy
state for the public IaaS infrastructures. We have also
discussed how this system’s architecture encourages
the self-CHOP properties and invests in the
characteristics of the AISs.
We are currently working on selective strategies
and methods to be used within the AIS. These
methods would conduct the infrastructure state
monitoring and control the security danger definition
and sensation, the activation and the proliferation of
the immune cells agents, and mechanisms to provide
the learning capabilities for the overall system.
In future works, we will be presenting a more
detailed architecture of this system through these
selective strategies and methods and a realisation of
the ACS self-CHOP properties. We will also be
presenting a straightforward implementation details
and experimental results of this system’s prototype
deployment on real IaaS environments such as AWS
or RackSpace infrastructures.
REFERENCES
Ahmad, I., Namal, S., Ylianttila, M. and Gurtov, A., 2015.
Security in software defined networks: A survey. IEEE
Communications Surveys & Tutorials, 17(4), pp.2317-
2346.
Aickelin, U., Dasgupta, D. and Gu, F., 2014. Artificial
immune systems. In Search Methodologies (pp. 187-
211). Springer US.
Cayzer, U.A.S., 2002. The danger theory and its application
to artificial immune system. In Proceedings of the 1st
International Conference on Artificial Immune Systems
(pp. 141-148).
Dasgupta, D., 1993. An overview of artificial immune
systems and their applications. In Artificial immune
systems and their applications (pp. 3-21). Springer
Berlin Heidelberg.
Dasgupta, D., 2007. An immuno-inspired autonomic
system for cyber defense. Information security
technical report, 12(4), pp.235-241.
Dasgupta, D., Ji, Z. and Gonzalez, F., 2003, December.
Artificial immune system (AIS) research in the last five
years. In Evolutionary Computation, 2003. CEC'03.
The 2003 Congress on (Vol. 1, pp. 123-130). IEEE.
Friedman-Hill, E., 2003. JESS in Action (Vol. 46).
Greenwich, CT: Manning.
Gonzales, D., Kaplan, J., Saltzman, E., Winkelman, Z. and
Woods, D., 2015. Cloud-trust-a security assessment
model for infrastructure as a service (IaaS) clouds.
IEEE Transactions on Cloud Computing.
Harmer, P.K., Williams, P.D., Gunsch, G.H. and Lamont,
G.B., 2002. An artificial immune system architecture
for computer security applications. IEEE transactions
on evolutionary computation, 6(3), pp.252-280.
Hill, R., Hirsch, L., Lake, P. and Moshiri, S., 2012. Guide
to cloud computing: principles and practice. Springer
Science & Business Media.
Horn, P., 2001. Autonomic computing: IBM\'s Perspective
on the State of Information Technology.
Huang, W., Ganjali, A., Kim, B.H., Oh, S. and Lie, D.,
2015. The state of public infrastructure-as-a-service
cloud security. ACM Computing Surveys (CSUR),
47(4), p.68.
Huebscher, M.C. and McCann, J.A., 2008. A survey of
autonomic computing—degrees, models, and
applications. ACM Computing Surveys (CSUR), 40(3),
p.7.
Kavis, M.J., 2014. Architecting the cloud: Design decisions
for cloud computing service models (SaaS, PaaS, AND
IaaS). John Wiley & Sons.
Kephart, J.O. and Chess, D.M., 2003. The vision of
autonomic computing. Computer, 36(1), pp.41-50.
Krutz, R.L. and Vines, R.D., 2010. Cloud security: A
comprehensive guide to secure cloud computing. Wiley
Publishing.
Liu, D., 2014. Securing Outsourced Databases in the Cloud.
In Security, Privacy and Trust in Cloud Systems (pp.
259-282). Springer Berlin Heidelberg.
Mather, T., Kumaraswamy, S. and Latif, S., Cloud Security
and Privacy (2009).
Mell, P. and Grance, T., 2011. The NIST definition of cloud
computing.
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A. and
Rajarajan, M., 2013. A survey of intrusion detection
techniques in the cloud. Journal of Network and
Computer Applications, 36(1), pp.42-57.
Rufus, R., Nick, W., Shelton, J. and Esterline, A., 2016. An
Autonomic Computing System based on a Rule-based
Policy Engine and Artificial Immune Systems.
Subashini, S. and Kavitha, V., 2011. A survey on security
issues in service delivery models of cloud computing.
Journal of network and computer applications, 34(1),
pp.1-11.
Vaquero, L.M., Rodero-Merino, L. and Morán, D., 2011.
Locking the sky: a survey on IaaS cloud security.
Computing, 91(1), pp.93-118.
Xing, T., Huang, D., Xu, L., Chung, C.J. and Khatkar, P.,
2013, March. Snortflow: A openflow-based intrusion
prevention system in cloud environment. In Research
and Educational Experiment Workshop (GREE), 2013
Second GENI (pp. 89-92). IEEE.
Yeluri, R. and Castro-Leon, E., 2014. Building the
Infrastructure for Cloud Security: A Solutions View.
Apress.