An Adaptive Intrusion Detection Scheme for Cloud Computing

被引:2
|
作者
Ibrahim, Nurudeen Mahmud [1 ]
Zainal, Anazida [1 ]
机构
[1] Univ Teknol Malaysia, Johor Baharu, Malaysia
关键词
Anomaly Detection; Ant Colony Optimization; Binary Segmentation; Cloud Security; DDoS; Machine Learning; Stochastic Gradient Descent; Time Series; DETECTION SYSTEM; R-PACKAGE; CHANGEPOINT; COLONY;
D O I
10.4018/IJSIR.2019100104
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To provide dynamic resource management, live virtual machine migration is used to move a virtual machine from one host to another. However, virtual machine migration poses challenges to cloud intrusion detection systems because movement of VMs from one host to another makes it difficult to create a consistent normal profile for anomaly detection. Hence, there is a need to provide an adaptive anomaly detection system capable of adapting to changes that occur in the cloud data during VM migration. To achieve this, the authors proposed a scheme for adaptive IDS for Cloud computing. The proposed adaptive scheme is comprised of four components: an ant colony optimization-based feature selection component, a statistical time series change point detection component, adaptive classification, and model update component, and a detection component. The proposed adaptive scheme was evaluated using simulated datasets collected from vSphere and performance comparison shows improved performance over existing techniques.
引用
收藏
页码:53 / 70
页数:18
相关论文
共 50 条
  • [31] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [32] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [33] A Survey on Intrusion Detection Systems for Fog and Cloud Computing
    Chang, Victor
    Golightly, Lewis
    Modesti, Paolo
    Xu, Qianwen Ariel
    Doan, Le Minh Thao
    Hall, Karl
    Boddu, Sreeja
    FUTURE INTERNET, 2022, 14 (03):
  • [34] Optimization scheme for intrusion detection scheme GBDT in edge computing center
    Cui, Ju-fu
    Xia, Hui
    Zhang, Rui
    Hu, Ben-xu
    Cheng, Xiang-guo
    COMPUTER COMMUNICATIONS, 2021, 168 : 136 - 145
  • [35] An Adaptive Network Intrusion Detection Approach for the Cloud Environment
    Chou, Hui-Hao
    Wang, Sheng-De
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 7 - 12
  • [36] An Intrusion Detection Framework for Supporting SLA Assessment in Cloud Computing
    Ficco, Massimo
    Rak, Massimiliano
    Di Martino, Beniamino
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 244 - 249
  • [37] Critical Review of Intrusion Detection Systems In Cloud Computing Environment
    Aborujilah, Abdulaziz
    Musa, Shahrulniza
    2016 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICTM), 2016, : 251 - 255
  • [38] Efficacious Novel Intrusion Detection System for Cloud Computing Environment
    Rana, Pooja
    Batra, Isha
    Malik, Arun
    Ra, In-Ho
    Lee, Oh-Sung
    Hosen, A. S. M. Sanwar
    IEEE ACCESS, 2024, 12 : 99223 - 99239
  • [39] Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview
    Rana, Pooja
    Batra, Isha
    Malik, Arun
    Imoize, Agbotiname Lucky
    Kim, Yongsung
    Pani, Subhendu Kumar
    Goyal, Nitin
    Kumar, Arun
    Rho, Seungmin
    COMPLEXITY, 2022, 2022
  • [40] A study on intrusion detection algorithms for user data cloud computing
    Li Y.
    International Journal of Simulation: Systems, Science and Technology, 2016, 17 (36): : 14.1 - 14.6