Intrusion Detection in Hybrid Cloud Networks

被引:0
作者
Suresh-Menon, Durga [1 ]
Leeser, Miriam [1 ]
Zink, Michael [2 ]
机构
[1] Northeastern Univ, Coll Engn, ECE, Boston, MA 02115 USA
[2] Univ Massachusetts Amherst, Coll Engn, ECE, Amherst, MA USA
来源
2024 IEEE CLOUD SUMMIT, CLOUD SUMMIT 2024 | 2024年
关键词
Network Intrusion Detection; Cybersecurity; Cloud Computing; Security; ACL; Detection; Prevention; Mitigation;
D O I
10.1109/Cloud-Summit61220.2024.00037
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The proliferation of cloud computing has significantly transformed the digital landscape, offering scalable resources and services over the Internet. However, this shift has also exposed cloud networks to a myriad of sophisticated cyber threats, necessitating robust and adaptive security mechanisms. Network Intrusion Detection Systems (NIDS) are put in place to manage some of these threats like denial of service attacks (DOS), distributed denial of service attacks (DDOS), scanning, and probing to name a few. This paper presents a novel approach to Network Intrusion Detection Systems (NIDS) tailored for hybrid cloud networks. The goal of our approach is to efficiently detect and mitigate an intruder by using a simple algorithm based on the data available in transmitted packets in a hybrid cloud network. Specifically, we identify potential network intruders assuming the very high data rates of modern data networks. Once the intruder is identified, their access to the network is restricted using the access control list on the switch. This approach can be done with very low latency and at line rate. We remove the suspected malicious user from the Access Control List (ACL) on a switch connected to the network admin server. We also propose a mechanism to reinstate the user if they successfully explain that they are not a network intruder. To evaluate the effectiveness of our approach, we conducted experiments in a simulated hybrid cloud network environment using data captured from a live data stream.
引用
收藏
页码:188 / 193
页数:6
相关论文
共 15 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]  
Baimukashev Rashid, 2021, C EL COMP COMP ICECC
[3]   A Review on Intrusion Detection Systems and Techniques [J].
Bhati, Nitesh Singh ;
Khari, Manju ;
Garcia-Diaz, Vicente ;
Verdu, Elena .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2020, 28 (Supp02) :65-91
[4]  
caida, The caida anonymized internet traces
[5]  
Gupta D., 2016, Research Advances in Integrated Navigation Systems
[6]  
Lazarevic A., 2005, MANAGING CYBER THREA
[7]  
Liu G.G., 2014, Applied Mechanics and Materials
[8]  
Mu Z., 2020, Intelligent Transportation, Big Data & Smart City
[9]  
Patel Hiral B, 2021, International Journal of Innovative Research in Computer Science & Technology (IJIRCST)
[10]  
Prabhu G.N., 2014, International Journal of Engineering Research and Applications, V4, P69