An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)

被引:8
作者
Alqahtani, Saeed M. [1 ]
Al Balushi, Maqbool [2 ,3 ]
John, Robert [4 ,5 ]
机构
[1] Univ Nottingham, Sch Comp Sci, ASAP Res Grp, Nottingham NG7 2RD, England
[2] Minist Manpower, Dept Networking & Informat Secur NIS, Muscat, Oman
[3] Minist Manpower, NIS, Muscat, Oman
[4] Univ Nottingham, Sch Comp Sci, Nottingham NG7 2RD, England
[5] Univ Nottingham, ASAP Res Grp, Nottingham NG7 2RD, England
来源
2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2 | 2014年
关键词
IDS; DDoS Attack; ICMP Flood; Cloud Computing; SaaSCloud; IDSServer; SIDSCC;
D O I
10.1109/CSCI.2014.108
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a distributed architecture that has shared resources, software, and information. There exists a great number of implementations and research for Intrusion Detection Systems (IDS) in grid and cloud environments; however they are limited in addressing the requirements for an ideal intrusion detection system. Security issues in Cloud Computing (CC) have become a major concern to its users, availability being one of the key security issues. Distributed Denial of Service (DDoS) is one of these security issues that poses a great threat to the availability of the cloud services. The aim of this research is to evaluate the performance of IDS in CC when the DDoS attack is detected in a private cloud, named SaaSCloud. A model has been implemented on three virtual machines; SaaSCloud Model, DDoS attack Model, and IDSServer Model. Through this implementation, Service Intrusion Detection System in Cloud Computing (SIDSCC) will be proposed, investigated and evaluated.
引用
收藏
页码:135 / 141
页数:7
相关论文
共 28 条
[1]  
Al-Duwairi B., 2009, JUST GOOGLE SEARCH E, P1
[2]  
Amazon, 2009, AM VIRT PRIV CLOUD A
[3]  
[Anonymous], J COMPUTER APPL
[4]  
[Anonymous], 2009, QUESTIONNAIRES 2 LAN, DOI DOI 10.4324/9780203864739
[5]  
[Anonymous], NETWORKER
[6]  
[Anonymous], ARXIV11095388
[7]  
Bace R., 2001, NIST Special Publication on Intrusion Detection Systems
[8]  
Bakshi Aman, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P260, DOI 10.1109/ICCSN.2010.56
[9]  
Bates S., 2010, SECURITY THOUGHT
[10]   A Service Based Approach to a New Generation of Intrusion Detection Systems [J].
Bosin, Andrea ;
Dessi, Nicoletta ;
Pes, Barbara .
PROCEEDINGS OF THE SIXTH IEEE EUROPEAN CONFERENCE ON WEB SERVICES, 2008, :215-224