Intrusion damage assessment for multi-stage attacks for clouds

Arshad, Junaid, Azad, Muhammad Ajmal, Jokhio, Imran Ali and Townend, Paul (2013) Intrusion damage assessment for multi-stage attacks for clouds. IET Communications, 7 (12). pp. 1304-1315. ISSN 1751-8628

This is the latest version of this item.

[img] Microsoft Word
Intrusion Damage Assessment for Multi-stage Attacks for Clouds.doc - Accepted Version

Download (6MB)

Abstract

Clouds represent a major paradigm shift from contemporary systems, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of flexible computing infrastructures that are available on demand. Clouds, however, introducing novel challenges particularly with respect to security that require dedicated efforts to address them. This study is focused at one such challenge, that is, determining the extent of damage caused by an intrusion for a victim virtual machine. It has significant implications especially with respect to effective response to the intrusion. This study presents the efforts to address this challenge for Clouds in the form of a novel scheme for intrusion damage assessment for Clouds. In addition to its context-aware operation, the scheme facilitates protection against multi-stage attacks. The study also includes the formal specification and evaluation of the scheme, which successfully demonstrate its effectiveness to achieve rigorous damage assessment for Clouds.

Item Type: Article
Subjects: Computing
Depositing User: Junaid Arshad
Date Deposited: 06 Jun 2016 14:17
Last Modified: 07 Jun 2016 15:31
URI: http://repository.uwl.ac.uk/id/eprint/2233

Available Versions of this Item

  • Intrusion damage assessment for multi-stage attacks for clouds. (deposited 06 Jun 2016 14:17) [Currently Displayed]

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu