A DISTRIBUTED INTRUSION DETECTION MODEL BASED ON CLOUD THEORY

被引:0
|
作者
Li, Han [1 ]
Wu, Qiuxin [1 ]
机构
[1] Beijing Informat Sci & Technol Univ, Sch Appl Sci, Beijing, Peoples R China
关键词
Cloud model; Intrusion detection; Distributed; DDoS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over the time. Distributed attacks could not be detected by the present available intrusion detection system. In this case, we propose a distributed intrusion detection model based on Cloud theory. Our model is composed by Intrusion Detection Agent subsystem and Data Aggregation subsystem. Intrusion Detection Agent subsystem has three parts: data collection module, Cloud decision-making module and communication module. An intrusion detection algorithm based on Cloud theory was proposed to detect intrusion behavior and improve the detection ability to complicated intrusion. Followed by our model, we introduced a strategy to defend DDoS attack using the elastic properties of cloud platform.
引用
收藏
页码:435 / 439
页数:5
相关论文
共 50 条
  • [41] Cloud Based Intrusion Detection Architecture for Smartphones
    Kumar, Manish
    Hanumanthappa, M.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [42] Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey
    Samkari, Esraa
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 67 - 74
  • [43] A Multi-agent System-Based Distributed Intrusion Detection System for a Cloud Computing
    Achbarou, Omar
    El Kiram, My Ahmed
    Bourkoukou, Outmane
    Elbouanani, Salim
    NEW TRENDS IN MODEL AND DATA ENGINEERING (MEDI 2018), 2018, 929 : 98 - 107
  • [44] Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory
    Pirozmand, Poria
    Ghafary, Mohsen Angoraj
    Siadat, Safieh
    Ren, Jiankang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [45] Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper Optimization
    Parganiha V.
    Shukla S.P.
    Sharma L.K.
    International Journal of Ambient Computing and Intelligence, 2022, 13 (01):
  • [46] Application of a collaborative filtering recommendation algorithm based on cloud model in intrusion detection
    Wang D.
    Zhou Z.
    Journal of Networks, 2011, 6 (02) : 214 - 221
  • [47] Optimized Blockchain-Based Deep Learning Model for Cloud Intrusion Detection
    Alasmari, Sultan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (09) : 914 - 925
  • [48] Intrusion Detection in the Cloud
    Roschke, Sebastian
    Cheng, Feng
    Meinel, Christoph
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 729 - 734
  • [49] An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
    Neeraj Kumar
    Jaskaran Preet Singh
    Rasmeet S. Bali
    Sudip Misra
    Sana Ullah
    Cluster Computing, 2015, 18 : 1263 - 1283
  • [50] An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
    Kumar, Neeraj
    Singh, Jaskaran Preet
    Bali, Rasmeet S.
    Misra, Sudip
    Ullah, Sana
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2015, 18 (03): : 1263 - 1283