cl-CIDPS: A Cloud Computing Based Cooperative Intrusion Detection and Prevention System Framework

被引:8
作者
Al-Mousa, Zahraa [1 ]
Nasir, Qassim [1 ]
机构
[1] Univ Sharjah, Dept Comp & Elect Engn, Sharjah, U Arab Emirates
来源
FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015 | 2015年 / 523卷
关键词
IDS; IDPS; Cloud computing; Intrusion detection and prevention system;
D O I
10.1007/978-3-319-19210-9_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is one of today's most promising technologies due to its cost-efficiency, flexibility and scalability for computing processes. However, the complex architecture of cloud infrastructure and the different levels of users lead to special requirements especially in security area. The Cloud provider is responsible for providing secure, reliable and trustful services to its consumers. Network intrusion detection system and network intrusion prevention system (IDPS), is a pioneer active security-defensive mechanism that is ideal to be used in cloud computing. Collaborative or cooperative IDS had been a hot topic for the last few years. However, there were some limitations in previous techniques indicating that they are not sufficient to cover all security threats in clouds. The main objective is to propose a cloud based cooperative intrusion detection and prevention system (cl-CIDPS). The system adds several contributions to the area of IDPS in clouds by proposing an integrated design that considers detection, prevention and logging capabilities applying both signature and anomaly detection mechanisms. cl-CIDPS was evaluated using a powerful network security simulator tool (Nessi2) that is capable of testing detection units and communication schemas. NeSSi2 was extended for a cloud based IDPS presenting a valuable simulation background that can be used by future researches to evaluate similar proposed techniques for cloud computing infrastructure.
引用
收藏
页码:181 / 194
页数:14
相关论文
共 19 条
[1]   A survey of peer-to-peer content distribution technologies [J].
Androutsellis-Theotokis, S ;
Spinellis, D .
ACM COMPUTING SURVEYS, 2004, 36 (04) :335-371
[2]  
Bye R., 2010, US WORKSH COLL METH
[3]  
Chi-Chun Lo, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P280, DOI 10.1109/ICPPW.2010.46
[4]  
Gul I., 2011, INT J ADV SCI TECHNO, V34, P71
[5]   A cooperative AIS framework for intrusion detection [J].
Luther, Katja ;
Bye, Rainer ;
Alpcan, Tansu ;
Mueller, Achim ;
Albayrak, Sahin .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :1409-+
[6]  
Mell P., 2010, NIST DEFINITION CLOU
[7]  
Mirkovic J., 2002, IEEE 10 INT C NETW P
[8]   A survey of intrusion detection techniques in Cloud [J].
Modi, Chirag ;
Patel, Dhiren ;
Borisaniya, Bhavesh ;
Patel, Hiren ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :42-57
[9]   A memory-based NFA regular expression match engine for signature-based intrusion detection [J].
Pao, Derek ;
Or, Nga Lam ;
Cheung, Ray C. C. .
COMPUTER COMMUNICATIONS, 2013, 36 (10-11) :1255-1267
[10]   An intrusion detection and prevention system in cloud computing: A systematic review [J].
Patel, Ahmed ;
Taghavi, Mona ;
Bakhtiyari, Kaveh ;
Celestino Junior, Joaquim .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :25-41