An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)

被引:8
作者
Alqahtani, Saeed M. [1 ]
Al Balushi, Maqbool [2 ,3 ]
John, Robert [4 ,5 ]
机构
[1] Univ Nottingham, Sch Comp Sci, ASAP Res Grp, Nottingham NG7 2RD, England
[2] Minist Manpower, Dept Networking & Informat Secur NIS, Muscat, Oman
[3] Minist Manpower, NIS, Muscat, Oman
[4] Univ Nottingham, Sch Comp Sci, Nottingham NG7 2RD, England
[5] Univ Nottingham, ASAP Res Grp, Nottingham NG7 2RD, England
来源
2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2 | 2014年
关键词
IDS; DDoS Attack; ICMP Flood; Cloud Computing; SaaSCloud; IDSServer; SIDSCC;
D O I
10.1109/CSCI.2014.108
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a distributed architecture that has shared resources, software, and information. There exists a great number of implementations and research for Intrusion Detection Systems (IDS) in grid and cloud environments; however they are limited in addressing the requirements for an ideal intrusion detection system. Security issues in Cloud Computing (CC) have become a major concern to its users, availability being one of the key security issues. Distributed Denial of Service (DDoS) is one of these security issues that poses a great threat to the availability of the cloud services. The aim of this research is to evaluate the performance of IDS in CC when the DDoS attack is detected in a private cloud, named SaaSCloud. A model has been implemented on three virtual machines; SaaSCloud Model, DDoS attack Model, and IDSServer Model. Through this implementation, Service Intrusion Detection System in Cloud Computing (SIDSCC) will be proposed, investigated and evaluated.
引用
收藏
页码:135 / 141
页数:7
相关论文
共 50 条
[41]   Detection and Prevention of Criminal Attacks in Cloud Computing Using a Hybrid Intrusion Detection Systems [J].
Nsabimana, Thierry ;
Bimenyimana, Christian Ildegard ;
Odumuyiwa, Victor ;
Hounsou, Joel Toyigbe .
INTELLIGENT HUMAN SYSTEMS INTEGRATION 2020, 2020, 1131 :667-676
[42]   A Survey on Intrusion Detection Systems for Fog and Cloud Computing [J].
Chang, Victor ;
Golightly, Lewis ;
Modesti, Paolo ;
Xu, Qianwen Ariel ;
Doan, Le Minh Thao ;
Hall, Karl ;
Boddu, Sreeja .
FUTURE INTERNET, 2022, 14 (03)
[43]   Intrusion Detection in the Cloud [J].
Roschke, Sebastian ;
Cheng, Feng ;
Meinel, Christoph .
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, :729-734
[44]   Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment [J].
Wang, Huaibin ;
Zhou, Haiyun ;
Wang, Chundong .
JOURNAL OF COMPUTERS, 2012, 7 (10) :2397-2403
[45]   A Novel Cloud Computing System Intrusion Detection Model Based on Modified Genetic Algorithm [J].
Huang, Wen-zhun ;
Xie, Xin-xin .
2016 INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY, ENVIRONMENT AND INFORMATION ENGINEERING (SEEIE 2016), 2016, :383-388
[46]   Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing [J].
Modi, Chirag N. ;
Patel, Dhiren R. ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 :905-912
[47]   Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment [J].
Aslan, Omer ;
Ozkan-Okay, Merve ;
Gupta, Deepti .
IEEE ACCESS, 2021, 9 :83252-83271
[48]   Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments [J].
Araujo, Josenilson Dias ;
Abdelouahab, Zair .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (11) :135-142
[49]   Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments [J].
Araujo, Josenilson Dias ;
Abdelouahab, Zair .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (11) :9-16
[50]   An Intelligent Job Scheduling System in Cloud Computing [J].
Liu, Jing ;
Luo, Xingguo ;
Li, Bainan .
SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 :1391-1394