An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems

Angın, Pelin
AHMED, Norman
BRİN, Kory
KOBES, Jason
Advances in cloud computing have made it a feasible and cost-effective solution to improve the resiliency of enterprise systems. However, the replication approach taken by cloud computing to provide resiliency leads to an increase in the number of ways an attacker can exploit or penetrate the systems. This calls for designing cloud systems that can accurately detect anomalies and dynamically adapt themselves to keep performing mission-critical functions even under attacks and failures. In this paper, we propose a self-adaptive resiliency approach for cloud enterprise systems that employs a live monitoring and moving target defense based approach to automatically detect deviations from normal behavior and reconfigure critical cloud processes through software-defined networking to mitigate attacks and reduce system downtime. The proposed solution is promising to present a unified framework for resilient cloud systems.


A Big Data Analytical Approach to Cloud Intrusion Detection
Gulmez, Halim Gorkem; Tuncel, Emrah; Angın, Pelin (null; 2018-06-30)
Advances in cloud computing in the past decade have made it a feasible option for the high performance computing and mass storage needs of many enterprises due to the low startup and management costs. Due to this prevalent use, cloud systems have become hot targets for attackers aiming to disrupt reliable operation of large enterprise systems. The variety of attacks launched on cloud systems, including zero-day attacks that these systems are not prepared for, call for a unified approach for real-time detect...
A Quality model for cloud-based enterprise information systems
Şener, Umut; Eren, Pekin Erhan; Department of Information Systems (2016)
Organizations have migrated from on-premise enterprise information systems to Cloud-based Enterprise Information Systems (Cloud-EIS) due to the benefits of cloud computing, such as flexibility, availability on demand, and interdependence in information technology infrastructure. Accordingly, enterprises perceive the significance of the quality of Cloud-EIS for improving their businesses, and they pay more attention to selecting the suitable Cloud-EIS. Having looked at the extensive literature, only a few re...
An End-to-End Security Auditing Approach for Service Oriented Architectures
AZARMİ, Mehdi; BHARGAVA, Bharat; Angın, Pelin; RANCHAL, Rohit; AHMED, Norman; SİNCLAİR, Asher; LİNDERMAN, Mark; BEN OTHMANE, Lotfi (2012-10-11)
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement of multiple service providers in a service request. The interactions of independent service domains in SOA could violate service policies or SLAs. In addition, users in SOA systems have no control on what happens...
A secure model for efficient live migration of containers
Mavus, Zeynep; Angın, Pelin (2019-09-01)
Cloud services have become increasingly widespread in the past decade due to their ability to reduce the complexity and the cost of managing computers and networks. Cloud applications are run in virtualized environments such as virtual machines and containers to be able to allocate resources in an inexpensive manner. Both of these approaches require effective resource utilization, for which an important enabling technology is live migration, which involves moving a service from one host to another with the ...
Hardware Accelerators for Cloud Computing: Features and Implementation
Tirlioglu, Anil; Demir, Omer Bayram; Yazar, Alper; Schmidt, Şenan Ece (2021-01-01)
In this paper, hardware accelerator (FHA) applications realized on FPGA that can be offered as a service in cloud computing systems are discussed. It is necessary to know the hardware resources used by FHA applications and the performance they provide for the efficient meeting of the user requests and effective resource planning. To this end, the first contribution of this paper is to provide a compilation of the literature on the features of frequently used hardware accelerators (matrix multiplication, fac...
Citation Formats
M. VİLLARREAL VASQUEZ et al., “An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems,” 2017, Accessed: 00, 2020. [Online]. Available: