Including Security Monitoring in Cloud Service Level Agreement (SLA)
Amir Teshome Supervisors Louis Rilling Christine Morin July 5, 2016
Amir Teshome Including Security Monitoring in Cloud SLA 1 / 11
Including Security Monitoring in Cloud Service Level Agreement (SLA) - - PowerPoint PPT Presentation
Including Security Monitoring in Cloud Service Level Agreement (SLA) Amir Teshome Supervisors Louis Rilling Christine Morin July 5, 2016 Amir Teshome Including Security Monitoring in Cloud SLA 1 / 11 Introduction SLAs & Security
Amir Teshome Including Security Monitoring in Cloud SLA 1 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 1 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 1 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
User Portal VM 1 VM 2 VM 3 VM 4 VM 6 VM 5
Amir Teshome Including Security Monitoring in Cloud SLA 2 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
User Portal VM 1 VM 2 VM 3 VM 4 VM 6 VM 5
Amir Teshome Including Security Monitoring in Cloud SLA 2 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
User Portal VM 1 VM 2 VM 3 VM 4 VM 6 VM 5
Amir Teshome Including Security Monitoring in Cloud SLA 2 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Security Monitoring
1“Tao of Network Security Monitoring, Beyond Intrusion Detection” by Richard Bejtlich Amir Teshome Including Security Monitoring in Cloud SLA 3 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Security Monitoring
1“Tao of Network Security Monitoring, Beyond Intrusion Detection” by Richard Bejtlich Amir Teshome Including Security Monitoring in Cloud SLA 3 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Security Monitoring
1“Tao of Network Security Monitoring, Beyond Intrusion Detection” by Richard Bejtlich Amir Teshome Including Security Monitoring in Cloud SLA 3 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Security Monitoring
Amir Teshome Including Security Monitoring in Cloud SLA 4 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Security Monitoring
Amir Teshome Including Security Monitoring in Cloud SLA 4 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Security Monitoring
Amir Teshome Including Security Monitoring in Cloud SLA 4 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Security Monitoring
Amir Teshome Including Security Monitoring in Cloud SLA 4 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Security Monitoring
Amir Teshome Including Security Monitoring in Cloud SLA 4 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 5 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 5 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 5 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 5 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 5 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 5 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 6 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 6 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 6 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 6 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 6 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 6 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 7 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 7 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 7 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 7 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 7 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 7 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
1I: presence of intrusion & A: Presence of Alarm Amir Teshome Including Security Monitoring in Cloud SLA 8 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
1I: presence of intrusion & A: Presence of Alarm Amir Teshome Including Security Monitoring in Cloud SLA 8 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
1I: presence of intrusion & A: Presence of Alarm Amir Teshome Including Security Monitoring in Cloud SLA 8 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Source: https://docs.eyesopen.com/toolkits/cookbook/python/plotting/roc.html
Amir Teshome Including Security Monitoring in Cloud SLA 8 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
1I: presence of intrusion & A: Presence of Alarm Amir Teshome Including Security Monitoring in Cloud SLA 8 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
1I: presence of intrusion & A: Presence of Alarm Amir Teshome Including Security Monitoring in Cloud SLA 8 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
1I: presence of intrusion & A: Presence of Alarm Amir Teshome Including Security Monitoring in Cloud SLA 8 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
1I: presence of intrusion & A: Presence of Alarm Amir Teshome Including Security Monitoring in Cloud SLA 8 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Controller Host 1 Host 2
VM1 VM2 VM3 VM4 IDS IDS
Amir Teshome Including Security Monitoring in Cloud SLA 9 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Controller Host 1 Host 2
VM1 VM2 VM3 VM4 IDS IDS
Amir Teshome Including Security Monitoring in Cloud SLA 9 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Controller Host 1 Host 2
VM1 VM2 VM3 VM4 IDS IDS
Attacker
Amir Teshome Including Security Monitoring in Cloud SLA 9 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Controller Host 1 Host 2
VM1 VM2 VM3 VM4 IDS IDS
Target VM Attacker
Amir Teshome Including Security Monitoring in Cloud SLA 9 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Controller Host 1 Host 2
VM1 VM2 VM3 VM4 IDS IDS
Attacker Target VM
Amir Teshome Including Security Monitoring in Cloud SLA 9 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Controller Host 1 Host 2
VM1 VM2 VM3 VM4 IDS IDS
logging logging logging Attacker Target VM
Amir Teshome Including Security Monitoring in Cloud SLA 9 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Amir Teshome Including Security Monitoring in Cloud SLA 10 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Amir Teshome Including Security Monitoring in Cloud SLA 10 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work Evaluation Metrics IDS Evaluation Method
Amir Teshome Including Security Monitoring in Cloud SLA 10 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 11 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 11 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 11 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 11 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 11 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 11 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 11 / 11
Introduction SLAs & Security Monitoring Challenges IDS Evaluation Conclusion and Future Work
Amir Teshome Including Security Monitoring in Cloud SLA 11 / 11