Framework for Cloud Intrusion Detection System Service

被引:0
作者
Aljurayban, Nouf Saleh [1 ]
Emam, Ahmed [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh, Saudi Arabia
来源
2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN) | 2015年
关键词
Intrusion Detection; Data Mining; cloud computing; Artificial Neural Network; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this Internet era, the use of cloud computing is causing a massive volume of online financial transactions, and the exchange of personal and sensitive information over the internet. Attackers use many different types of malware in searches motivated by curiosity or financial gain. In this paper, we propose an efficient framework called the Layered Intrusion Detection Framework (LIDF) that can be applied on the different layers of cloud computing in order to identify the presence of normal traffic among the monitored cloud traffic. The proposed framework uses data mining, especially an Artificial Neural Network, which makes it accurate, fast, and scalable. At the same time, the LIDF can reduce the rate of the analyzed traffic and achieve better performance by increasing the throughput without affecting its main goal.
引用
收藏
页数:5
相关论文
共 22 条
  • [11] A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing[J]. Khorshed, Md. Tanzim;Ali, A. B. M. Shawkat;Wasimi, Saleh A. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012(06)
  • [12] Secure virtualization for cloud computing[J]. Lombardi, Flavio;Di Pietro, Roberto. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011(04)
  • [13] Mof M., 2011, ACM SIGOPS Operating Systems Review, V45, P38, DOI [10.1145/2007183.2007189, DOI 10.1145/2007183.2007189]
  • [14] Patil P., 2015, J INFORM ENG APPL, V5, P31
  • [15] Popuri V., 2011, INTRUSION DETECTION
  • [16] Intrusion Detection in the Cloud[J]. Roschke, Sebastian;Cheng, Feng;Meinel, Christoph. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009
  • [17] Soares L. F., 2014, SECURITY PRIVACY TRU, P3
  • [18] Taghavi Zargar S., 2012, DCDIDP DISTRIBUTED C
  • [19] Vanathi R., 2012, International Conference on Computer Communication and Informatics (ICCCI -2012), P1
  • [20] Yassin W., 2012, INT C CYBER SECURITY, P213