{"title":"SMM-Based Hypervisor Integrity Measurement","authors":"W. A. R. Souza, A. Tomlinson","doi":"10.1109/CSCloud.2015.57","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.57","url":null,"abstract":"Hypervisors play an important role in the virtualised environment and consequently are a prime target for attacks. Different kinds of attacks have been reported and a great deal of research has been done to address vulnerabilities in hypervisors. Recently, after successful defeat of integrity measurement tools, a new class of measurement tools have been developed capitalising on the SMM to measure the integrity of hypervisors and other system components. Although those new tools are successful in their tasks, they do not take full advantage of the main benefits of SMM: isolation and stealth. We argue that this is due to the architecture those tools employ. Thus, in this paper, we establish a set of requirements and propose a generic architecture to build and deploy an SMM-based hypervisor integrity measurement tool. We believe that such an architecture might be applied to any SMM-based tool.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry","authors":"Keke Gai, Z. Du, Meikang Qiu, Hui Zhao","doi":"10.1109/CSCloud.2015.73","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.73","url":null,"abstract":"The broad implementation of cloud computing has brought a dramatic change to multiple industries, which derives from the development of the Internet-related technologies. This trend has enabled global enterprises to apply distributed computing techniques to reach many benefits. An effective risk management approach is required for service deliveries and a capacity planning is considered one of the convincing methods for financial industry. However, executing a capacity planning is still encountering a great challenge from bottlenecks of the Web server capacities. The unstable service demands often result in service delays, which embarrasses the competitivenesses of the enterprises. This paper addresses this issue and proposes an approach, named Efficiency-aware Cloud-based Workload Optimization (ECWO) Model, using greedy programming to predict server workloads of heterogeneous cloud computing in financial industry. The main algorithms used in the proposed model are Task Mapping Algorithm (TMA) and Efficiency-Aware Task Assignment (EATA) Algorithm. Our experimental evaluations have examined the performance of the proposed scheme.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127808610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, T. Kurokawa
{"title":"Integral Attack on Reduced-Round Rectangle","authors":"Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, T. Kurokawa","doi":"10.1109/CSCloud.2015.15","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.15","url":null,"abstract":"RECTANGLE is a 64-bit block cipher with 80 and 128-bit key length proposed by Zhang et al(Lightweight Cryptography Workshop 2015). Integral attack is one of the typical evaluation tools of block cipher. The designers showed 7-round integral distinguisher. On the other hand, we find 8-round integral distinguisher which has balanced columns by our proposal search method of integral distinguisher. In this paper, we present the first integral attack on reduced-round RECTANGLE. Based on 8-round distinguisher, we can attack 12-round RECTANGLE-128 with computational complexity 2^109.98 with partial sum technique. Also, we can attack 10-round RECTANGLE-80 with computational complexity 270.08.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reliable Broadcasting Algorithm in Locally Twisted Cubes","authors":"B. Cheng, Jianxi Fan, Dajin Wang, Jiwen Yang","doi":"10.1109/CSCloud.2015.13","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.13","url":null,"abstract":"Reliable broadcasting for a network can be obtained by using completely independent spanning trees(CISTs). Locally twisted cubes are popular networks which have been studied widely in the literature. In this paper, we study the problem of using CISTs to establish reliable broadcasting in locally twisted cubes. We first propose an algorithm, named LTQCIST, to construct two CISTs in locally twisted cubes, then exemplify the construction procedures to construct CISTs. Finally, we prove the correctness of Algorithm LTQCIST and simulate CISTs with JUNG.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114071616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Minimize Crossings in Phylogenetic Trees","authors":"M. Ali, Kutub Thakur, John V. Monaco, Meikang Qiu","doi":"10.1109/CSCloud.2015.47","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.47","url":null,"abstract":"Visualization of phylogenetic trees became popular and has been widely used in biology, taxonomy, cloud computing, and bioinformatics. Different phylogenetic trees can be built based on different measures and methods. As a result, the problem became obvious when deciding which tree is better and most visually appealing. This often involves comparing two phylogenetic trees to each other. The main goal of this paper is to display a pair of alternative phylogenetic trees together while minimizing the number of crossings among the branches of both trees. This paper summarizes different tools and techniques used in visualizing phylogenetic trees in different studies and describes their limitations. After surveying different studies involved in crossings minimization, a naive algorithm to minimize the number of crossings is proposed.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An SDN-Based Fabric for Flexible Data-Center Networks","authors":"Longbin Chen, Meikang Qiu, Jian Xiong","doi":"10.1109/CSCloud.2015.59","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.59","url":null,"abstract":"Data-centers play a fundamental role in cloud computing. As the market of cloud computing continues to scale, it becomes increasingly difficult to utilize resources in large data-center networks. There is a growing interest to seek for efficient data-center architectures among academia and industry. Software-defined Networking (SDN) is a promising technology to develop scalable network architectures for massive data processing. SDN decouples control planes from physical switches and centralizes network management. However, most of the previous works merging SDN with data-center networks use tree or fat-tree topologies. These topologies have fixed architectures and are difficult to make full use of the features supported by SDN. In this paper, we proposed a fabric topology to provide a flexible data-center network. With SDN controllers, our work has the potential to address critical issues such as bandwidth utilization and network capacity in datacenter networks.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132441321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Kernel Vulnerabilities During the Development Phase","authors":"N. Zaidenberg, E. Khen","doi":"10.1109/CSCloud.2015.91","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.91","url":null,"abstract":"Testing is one of the major problems in Linux kernel development cycle. Security analysis and ensuring no new vulnerabilities has been introduced is one of the toughest issues of testing. Kernel developers attempt to find as many security issues as possible before merging with the mainline branch. Failure to detect vulnerabilities will result in vulnerable kernel shipped by distribution and vulnerable systems. The kernel developers can choose between several industrial and open source tools to assist in the development process and shorten the development cycle. (Though not as many as user space developers. Kernel tools are limited and rare compared to user space tools) Some of these tools are used to test the reliability of the kernel and detect kernel vulnerabilities. Unfortunately, these tools are not sufficient! LgDb was introduced in [1], [2] in our previous work. LgDb is a proof-of-concept tool that was presented as an innovative framework for kernel profiling, code coverage and simulations. LgDb runs the inspected kernel on a para virtual environment based on Lguest. Most existing tools limitations stem from the nature of the task. A user space tool cannot inspect the kernel on which it runs on. By using virtualization LgDb eliminates most of the existing tools limitations. As far as the host is concerned LgDb runs as a user process and the need for complex kernel space tools is alleviated. In this work we will present an extension to LgDb in order to detect kernel security vulnerabilities. The vulnerabilities detection process is not automatic. However, LgDb allows the developer test the code during the development, similarly to a debugger. The vulnerabilities types that LgDb addresses are proved to be lacking efficient automatic detection tools and manifested in several kernel vulnerabilities.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ihab Darwish, O. Igbe, O. Celebi, T. Saadawi, Joseph Soryal
{"title":"Smart Grid DNP3 Vulnerability Analysis and Experimentation","authors":"Ihab Darwish, O. Igbe, O. Celebi, T. Saadawi, Joseph Soryal","doi":"10.1109/CSCloud.2015.86","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.86","url":null,"abstract":"This paper highlights different security threats and vulnerabilities that is being challenged in smart-grid utilizing Distributed Network Protocol (DNP3) as a real time communication protocol. Experimentally, we will demonstrate two scenarios of attacks, unsolicited message attack and data set injection. The experiments were run on a computer virtual environment and then simulated in DETER testbed platform. The use of intrusion detection system will be necessary to identify attackers targeting different part of the smart grid infrastructure. Therefore, mitigation techniques will be used to ensure a healthy check of the network and we will propose the use of host-based intrusion detection agent at each Intelligent Electronic Device (IED) for the purpose of detecting the intrusion and mitigating it. Performing attacks, attack detection, prevention and counter measures will be our primary goal to achieve in this research paper.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Investigation on Cyber Security Threats and Security Models","authors":"Kutub Thakur, Meikang Qiu, Keke Gai, M. Ali","doi":"10.1109/CSCloud.2015.71","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.71","url":null,"abstract":"Cyber security has been used interchangeably for information security, where later considers the role of the human in the security process while former consider this as an additional dimension and also, focus person has a potential target. However, such discussion on cyber security has important implication as it focuses on the ethical part of the society as a whole. To address the issue of cyber security, various frameworks and models have been developed. It also introduces the concepts of cyber security in terms of its framework, workforces and information related to protecting personal information in the computer. This paper reviews these models along with their limitations and review the past techniques used to mitigate these threats. Furthermore, the report also provides recommendations for future research.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129331430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using ELM Techniques to Predict Data Centre VM Requests","authors":"Salam Ismaeel, A. Miri","doi":"10.1109/CSCloud.2015.82","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.82","url":null,"abstract":"Data centre prediction models can be used to forecast future loads for a given centre in terms of CPU, memory, VM requests, and other parameters. An effective and efficient model can not only be used to optimize resource allocation, but can also be used as part of a strategy to conserve energy, improve performance and increase profits for both clients and service providers. In this paper, we have developed a prediction model, which combines k-means clustering techniques and Extreme Learning Machines (ELMs). We have shown the effectiveness of our proposed model by using it to estimate future VM requests in a data centre based on its historical usage. We have tested our model on real Google traces that feature over 25 million tasks collected over a 29-day time period. Experimental results presented show that our proposed system outperforms other models reported in the literature.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}