Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing

被引:43
作者
Modi, Chirag N. [1 ]
Patel, Dhiren R. [1 ]
Patel, Avi [2 ]
Rajarajan, Muttukrishnan [2 ]
机构
[1] NIT Surat, Surat, India
[2] City Univ London, London, England
来源
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012] | 2012年 / 1卷
关键词
Cloud computing; Network based intrusion detection system; Snort; Signature apriori algorithm;
D O I
10.1016/j.protcy.2012.10.110
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the major security issues in Cloud computing is to detect malicious activities at the network layer. In this paper, we propose a framework integrating network intrusion detection system (NIDS) in the Cloud. Our NIDS module consists of Snort and signature apriori algorithm. It generates new rules from captured packets. These new rules are appended in the Snort configuration file to improve efficiency of Snort. It aims to detect known attacks and derivative of known attacks in Cloud by monitoring network traffic, while ensuring low false positive rate with reasonable computational cost. We also recommend the positioning of NIDS in Cloud. We present experimental setup and discuss the design goals expected from proposed framework. (C) 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkela
引用
收藏
页码:905 / 912
页数:8
相关论文
共 16 条
[1]  
[Anonymous], IT CLOUD SERVICES 2
[2]  
[Anonymous], 2011, Pei. data mining concepts and techniques
[3]  
Ashraf M., 2010, INT J ADV COMPUTER S, V1
[4]  
Bakshi Aman, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P260, DOI 10.1109/ICCSN.2010.56
[5]  
Brown D.J., 2002, A Survey of Intrusion Detection Systems
[6]   Distributed Intrusion Detection in Clouds Using Mobile Agents [J].
Dastjerdi, Amir Vahid ;
Abu Bakar, Kamalrulnizam ;
Tabatabaei, Sayed Gholam Hassan .
2009 THIRD INTERNATIONAL CONFERENCE ON ADVANCED ENGINEERING COMPUTING AND APPLICATIONS IN SCIENCES (ADVCOMP 2009), 2009, :175-+
[7]  
Dutkevych T, 2007, INT WORKSH INT DATA, P599
[8]  
Lauzon Vincent-Philippe, DEP APPL MIGRATION 2
[9]  
Lo C.C., 2008, First IEEE International Conference on Ubi-Media Computing, P280
[10]  
Mazzariello Claudio, 2010, 2010 Sixth International Conference on Information Assurance and Security (IAS 2010), P265, DOI 10.1109/ISIAS.2010.5604069