Detection of New Attacks on Ubiquitous Services in Cloud Computing and Against Measure

被引:2
作者
Sellami, Lynda [1 ]
Idoughi, Djilali [1 ,2 ]
Tiako, Pierre F. [3 ]
机构
[1] AlMira Univ Bejaia, Dept Comp Sci, Bejaia, Algeria
[2] AlMira Univ Bejaia, Appl Math Lab, Bejaia, Algeria
[3] Tiako Univ, CITDR, Oklahoma City, OK USA
关键词
Cloud Computing; Intrusion Detection System (IDS); Privacy; Ubiquitous Computing; INTRUSION DETECTION;
D O I
10.1166/asl.2016.7991
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the opening of enterprises that can provide ready infrastructure in cloud computing, effective management of resources is needed. The distributed nature, ubiquitous service and a wide usage of information makes cloud computing vulnerable to intrusions not supported by cloud security system. Intrusion Detection Systems (IDS) are safety mechanisms that are widely used to detect malicious behavior in network communications and hosts. In this paper, we focus on IDSs to defend against cloud computing intruders. We propose a new intrusion detection technique based on customer's authentication in cloud computing. This technique detects unusual use of ubiquitous services and prevents cloud computing intrusions. The proposed IDS is based on a new double protection approach (security user nodes and global security cloud environment) detecting and preventing intrusions from inside and outside the cloud computing network.
引用
收藏
页码:3168 / 3172
页数:5
相关论文
共 31 条
[1]  
[Anonymous], IEEE T DEPENDABLE SE
[2]  
[Anonymous], 2011, SPECIAL PUBLICATION
[3]  
Bace R., 2001, NIST Special Publication on Intrusion Detection Systems
[4]  
Bhadauria R., 2011, IEEE COMMUNICATIONS
[5]  
Cooke E., EXAMINATION RIDS SNO
[6]   Distributed Intrusion Detection in Clouds Using Mobile Agents [J].
Dastjerdi, Amir Vahid ;
Abu Bakar, Kamalrulnizam ;
Tabatabaei, Sayed Gholam Hassan .
2009 THIRD INTERNATIONAL CONFERENCE ON ADVANCED ENGINEERING COMPUTING AND APPLICATIONS IN SCIENCES (ADVCOMP 2009), 2009, :175-+
[7]  
Grance Timothy., 2011, The NIST Definition of Cloud Computing
[8]  
Gul I., 2010, INT J ADV SCI TECHNO, V34, P71
[9]   A novel network Intrusion Detection System(NIDS) based on signatures search of data mining [J].
Hu Zhengbing ;
Li Zhitang ;
Wu Junqi .
FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, :10-+
[10]   On Technical Security Issues in Cloud Computing [J].
Jensen, Meiko ;
Schwenk, Joerg ;
Gruschka, Nils ;
Lo Iacono, Luigi .
CLOUD: 2009 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2009, :109-+