Proxy Network Intrusion Detection System for Cloud Computing

被引:0
|
作者
Oktay, Ueman [1 ]
Sahingoz, Ozgur Koray [1 ]
机构
[1] Turkish Air Force Acad TuAFA, Dept Comp Engn, Istanbul, Turkey
关键词
cloud computing; security; intrusion detection; proxy NIDS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the state of the art approach of information technologies. While migrating from conventional data centers to cloud computing paradigm, administrators have to consider costs. Security is one of the biggest problems for all information technologies and also in cloud computing. Some mechanisms are used such as antivirus software, firewall, guard systems or intrusion detection/prevention systems to increase the system security. The main handicap of these mechanisms is extensive usage of hardware, especially CPU and memory. In this paper, we examine the hardware usage of Network Intrusion Detection Systems (NIDSs) with different network architectures. Although the virtualization is preferred by the most of the providers, we chose a virtualized environment as our test bed because of its easier implementation structure from other cloud technologies such as grid and blade architectures. We focused on a proxy NIDS architecture, which is a gateway-based approach (intrusion detection assignment carried out by an outer entity, so why we called it proxy) and has less hardware requirements than other positioning options. It is aimed to show an effective location to IDSs in a virtualized environment. As a result, both providers and customers can easily decide where to locate their defense mechanism.
引用
收藏
页码:98 / 104
页数:7
相关论文
共 50 条
  • [1] Design of the Network Security Intrusion Detection System Based on the Cloud Computing
    Di, Meng
    [J]. CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 68 - 73
  • [2] Bayesian Classifier and Snort based Network Intrusion Detection System in Cloud Computing
    Modi, Chirag N.
    Patel, Dhiren R.
    Patel, Avi
    Muttukrishnan, Rajarajan
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [3] Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
    Ali, Mohammed Hasan
    Zolkipli, Mohamad Fadli
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7360 - 7363
  • [4] A Collaborative Intrusion Detection and Prevention System in Cloud Computing
    Hassani, Mohamed
    Lebbat, Adil
    Talial, Saida
    Imedromi, Hicham
    [J]. AFRICON, 2013, 2013,
  • [5] Poster: Developing an Intrusion Detection System for Cloud Computing
    Dang Duy Thang
    Le Hoai Nam
    Nguyen Tan Khoi
    [J]. MOBISYS'16: COMPANION COMPANION PUBLICATION OF THE 14TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2016, : 20 - 20
  • [6] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    [J]. ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [7] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [8] Intrusion Detection System in Cloud Computing: Challenges and Opportunities
    Mehmood, Yasir
    Shibli, Muhammad Awais
    Habiba, Umme
    Masood, Rahat
    [J]. 2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 59 - 66
  • [9] An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
    Alqahtani, Saeed M.
    Al Balushi, Maqbool
    John, Robert
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 135 - 141
  • [10] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283