HIDS: A host based intrusion detection system for cloud computing environment

被引:75
作者
Deshpande P. [1 ]
Sharma S.C. [1 ]
Peddoju S.K. [2 ]
Junaid S. [2 ]
机构
[1] Department of Applied Science & Engineering, Indian Institute of Technology Roorkee, Roorkee, 247667, Uttarakhand
[2] Department of Computer Science & Engineering, Indian Institute of Technology Roorkee, Roorkee, 247667, Uttarakhand
关键词
Cloud; Detection; Host based IDS; Network; OpenNebula; Security; System call traces; Virtual machine;
D O I
10.1007/s13198-014-0277-7
中图分类号
学科分类号
摘要
The paper reports a host based intrusion detection model for Cloud computing environment along with its implementation and analysis. This model alerts the Cloud user against the malicious activities within the system by analyzing the system call traces. The method analyses only selective system call traces, the failed system call trace, rather than all. An early detection of intrusions with reduced computational burden can be possible with this feature. The reported model provides security as a service (SecaaS) in the infrastructure layer of the Cloud environment. Implementation result shows 96 % average intrusion detection sensitivity. © 2014, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:567 / 576
页数:9
相关论文
共 23 条
  • [1] Abraham A., Grosan C., Martin-Vide C., Evolutionary design of intrusion detection programs, Int J Netw Secur, 4, 3, pp. 328-339, (2007)
  • [2] Aggarwal C., Zhai C., A survey of text classification algorithms, Mining Text Data, pp. 163-222, (2012)
  • [3] Anderson J., Computer security threat monitoring and surveillance, Technical report, (1980)
  • [4] Barbhuiya F., Et al., An active host-based intrusion detection system for ARP-related attacks and its verification, Int J Net Sec App, 3, 3, pp. 163-180, (2011)
  • [5] Cai L., Chen J., Ke Y., Chen T., Li Z., A new data normalization method for unsupervised anomaly intrusion detection, J Zhejiang Uni-SCI C, 11, 10, pp. 778-784, (2010)
  • [6] Denning D., An intrusion detection model, IEEE Trans Soft Eng, 13, 2, pp. 222-232, (1987)
  • [7] Deshpande P., Sharma S., Kumar S., Implementation of a private cloud: a case study, Adv Int Sys Comp, 259, 2, pp. 635-648, (2013)
  • [8] Doelitzscher F., Et al., An agent based business aware incident detection system for cloud environments, J Cloud Comp Adv Sys App, 1, (2012)
  • [9] Fawcett T., An introduction to ROC analysis, Patt Recog Lett, 27, pp. 861-874, (2006)
  • [10] Forrest S., Hofmeyr A., Somayaji A., Longsta T., A sense of self for Unix processes, pp. 120-128, (1996)