NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406157
|View full text |Cite
|
Sign up to set email alerts
|

Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS

Abstract: In an IaaS cloud the physical infrastructure is controlled by service providers, including its security monitoring aspect. Clients hosting their information system need to trust and rely on what the providers claim. At the same time providers try to give assurance for some aspects of the infrastructure (e.g. availability) through service level agreements (SLAs). We aim at extending SLAs to include security monitoring terms. In this paper we describe the challenges to reach this goal, we propose a three-steps i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…So, this research has enabled tenants to verify the integrity of the data, and providers need to verify the claim [7]. Wonjiga et al [8,35] has proposed detailed infrastructure for the monitoring of the security of service level agreements in IaaS clouds [8,35].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…So, this research has enabled tenants to verify the integrity of the data, and providers need to verify the claim [7]. Wonjiga et al [8,35] has proposed detailed infrastructure for the monitoring of the security of service level agreements in IaaS clouds [8,35].…”
Section: Related Workmentioning
confidence: 99%
“…The transparency and immutability are enforced by enabling the nodes to view and maintain the ledger, which can only be altered with other mining nodes' consensus. Some initial work has been done in the blockchain for SLAs, such as a blockchain-based framework for the negotiation of cloud services [2], implementation of SLAs in supply chain management system [3], validation of SLA violations [4], payment of the penalties in case of SLA violations [5,6], the integrity of SLA [7] and secure monitoring of SLA [8]. However, further work is required to investigate challenges to achieve end to end SLA monitoring and enforcement in a trustworthy manner.…”
Section: Introductionmentioning
confidence: 99%
“…Current cyber threats in the cloud are becoming highly sophisticated, and detecting such threats are both costly and time-consuming. Designing an effective IDS is essential for detecting insider and outsider attacks for securing cloud operations [11].…”
Section: Intrusion Detection In Cloudmentioning
confidence: 99%
“…The protection of VM migration is still an unsolved and complex issue, dependent on several factors, vendors and technology stacks [5]- [7]. Protecting VM migration against attacks from either insider or outsider threats is still challenging [9]- [11]. The live migration of VMs is insecure when the migration protocol is not encrypted, or it travels over an unprotected channel [10].…”
Section: Introductionmentioning
confidence: 99%
“…The life-cycle of an SLA can be separated in three phases called SLA definition and negotiation, SLA enforcement and SLA verification [20]. Methods were proposed for the SLA verification phase in the case of an NIDS [2,18,22]. In this paper, we show how we can achieve the SLA definition and negotiation phase, thanks to new constructs in a cloud SLA language and an efficient knowledge-base building method for NIDS performance.…”
Section: Introductionmentioning
confidence: 99%