Details

DESIGN OF ADAPTIVE DISTRIBUTED INTRUSION DETECTION SYSTEM FOR CLOUD COMPUTING

Hidam Rameshwar Singh

Hindustan University, Chennai

Dr. Rajeswari Mukhesh

HOD, Department Of CSE Hindustan University, Chennai

96-106

Vol: 6, Issue: 2, 2016

Receiving Date: 2016-03-02 Acceptance Date:

2016-04-08

Publication Date:

2016-05-05

Download PDF

Abstract

In the process of cloud deployment, the security issues cannot be underestimated. Due to their distributed nature, cloud computing environment are easy targets for intruders looking for possible vulnerabilities to exploit. There are various ways for an intruder to exploit and use the cloud resources maliciously. To combat attackers, intrusion detection system (IDS) offer additional security measure for cloud computing environment by investigating configuration, logs, network traffic and user action to identify typical attack behaviour.. The traditional IDSs can’t appropriately identify suspicious activities due to the limitation of HIDS and NIDS. Thus, in this paper a hybrid based IDS has been proposed where Hypervisor Based Intrusion detection System (HyIDS) will work together with HIDS to give an adaptive, distributive intrusion detection system. The combination of HyIDS and HIDS will have more detecting power.

Keywords: cloud computing, Intrusion detection system, hypervisor, virtual machine monitor introspection

References

  1. Deepa Krishnan and Madhumita Chatterjee “An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework”, Springer publication, SNDS 2012, CCIS 335, pp. 466–473,
  2. Jason Nikolai, Yong Wang “Hypervisor-based Cloud Intrusion Detection System “, College of Business and Information Systems Dakota State University Madison,s,2014 pp.989-993
  3. Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall“ Intrusion Detection for Grid and Cloud Computing “ , computer.org/ITPro July/Aug, IEEE-2010.pp.38-43.
  4. Lena AlMutair, Soha S. Zaghloul, “A New Virtualization-Based Security Architectureina Cloud Computing Environment ” College of Computer and Information Science King Saud University Riyadh, KSA. ISBN: 978-0-9853483-3-5 ©2013 SDIWC,pp.667-686.
  5. Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. & Rajarajan, M. (2013). “A survey of intrusion detection techniques in Cloud”. Journal of Network and Computer Applications,36(1), pp. 42-57. doi: 10.1016/j.jnca.2012.05.003 http://dx.doi.org/10.1016/j.jnca.2012.05.003
  6. Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande, “ Intrusion Detection System for Cloud Computing” International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012. pp.67-71.
  7. Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande, “ Intrusion Detection System for Cloud Computing” International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012. pp.67-71.
  8. Saeed M. Alqahtani, Maqbool Al Balushi, Robert John, “An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC)”, International Conference on Computational Science and Computational Intelligence,2014,CPS, pp.152-158
  9. Sebastian Roschke, Feng Cheng, Christoph Meinel,” Intrusion Detection in the Cloud” 8 th IEEE International Conference on Dependable, Autonomic and Secure Computing.IEEE Computer Society,2009,pp.729-734
  10. Shaohua Teng, Chaoyu Zheng, Haibin Zhu, Dongning Liu and Wei Zhang“A Cooperative Intrusion Detection Model for Cloud Computing Networks “, International Journal of Security and Its Applications , Vol.8, No.3 (2014), pp. 107-118 .
  11. Tongwook Hwang, Youngsang Shin,” Design of a Hypervisor-based Rootkit Detection Method for Virtualized Systems in Cloud Computing Environments” The 2013 AASRI Winter International Conference on Engineering and Technology. The Atlantis Press, pp.27-32.
  12. Tongwook Hwang, Youngsang Shin, Kyungho Son, Haeryong Park,” Virtual Machine Introspection Based Rootkit Detection in Virtualized Environments”, Life Science Journal 2014;11(7).pp.803-808
  13. Tal Garfinkel, Mendel Rosenblum, “A Virtual Machine Introspection Based Architecture for Intrusion Detection” Computer Science Department, Stanford University,2003.
  14. U. Oktay and O.K. Sahingoz, “Attack Types and Intrusion Detection Systems in Cloud Computing”,6th International Information Security and Cryptography Conference, Turkey, Sept. 2013.pp.71-76
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.