A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment

被引:26
|
作者
Gupta, Sanchika [1 ]
Kumar, Padam [1 ]
Abraham, Ajith [2 ,3 ]
机构
[1] Indian Inst Technol Roorkee, Dept Elect & Comp Engn, Roorkee 247667, Uttarakhand, India
[2] Sci Network Innovat & Res Excellence, Machine Intelligence Res Labs MIR Labs, Auburn, WA 98071 USA
[3] VSB Tech Univ Ostrava, Ctr Excellence IT4Innovat, Ostrava 70833, Czech Republic
关键词
All Open Access; Gold; Green;
D O I
10.1155/2013/364575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include software as a service, platform as a service, and infrastructure as a service. Cloud computing virtually and dynamically distributes the computing and data resources to a variety of users, based on their needs, with the use of virtualization technologies. As Cloud computing is a shared facility and is accessed remotely, it is vulnerable to various attacks including host and network based attacks (Brown 2012, and Grance 2009) and hence requires immediate attention. This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outsiders with the use of network profiling. With network profiling, a profile is created for each virtual machine (VM) in cloud that describes network behavior of each cloud user (an assigned VM). The behavior gathered is then used for determination (detection) of network attacks on cloud. The novelty of the approach lies in the early detection of network attacks with robustness and minimum complexity. The proposed technique can be deployed with minimal changes to existing cloud environment. An initial prototype implementation is verified and tested on private cloud with a fully functional implementation under progress.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Securing Cloud Environment using a String based Intrusion Detection System
    Raj, R. Sundar
    Bhaskaran, V. Murali
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [2] A Cloud Based Network Intrusion Detection System
    You, Li
    Wang, Zhanyong
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (03): : 987 - 992
  • [3] Securing M-voting Using Cloud Intrusion Detection and Prevention System: A New Dawn
    Moloja, Dina
    Mpekoa, Noluntu
    2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
  • [4] SnortFlow: A OpenFlow-based Intrusion Prevention System in Cloud Environment
    Xing, Tianyi
    Huang, Dijiang
    Xu, Le
    Chung, Chun-Jen
    Khatkar, Pankaj
    2013 SECOND GENI RESEARCH AND EDUCATIONAL EXPERIMENT WORKSHOP (GREE), 2013, : 89 - 92
  • [5] A VMM-based intrusion prevention system in cloud computing environment
    Hai Jin
    Guofu Xiang
    Deqing Zou
    Song Wu
    Feng Zhao
    Min Li
    Weide Zheng
    The Journal of Supercomputing, 2013, 66 : 1133 - 1151
  • [6] A VMM-based intrusion prevention system in cloud computing environment
    Jin, Hai
    Xiang, Guofu
    Zou, Deqing
    Wu, Song
    Zhao, Feng
    Li, Min
    Zheng, Weide
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (03): : 1133 - 1151
  • [7] An Enhanced Intrusion Detection Framework for Securing Network Layer of Cloud Computing
    Arjunan, Kamatchi
    Modi, Chirag N.
    2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), 2017, : 61 - 70
  • [8] Analysis of Securing Edge-Cloud Computing and Network Based Deep Neural Intrusion Detection System as a Solution Model
    Girma, Anteneh
    Tamirat, Marshet
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, INTELLISYS 2024, 2024, 1065 : 438 - 451
  • [9] An Adaptive Network Intrusion Detection Approach for the Cloud Environment
    Chou, Hui-Hao
    Wang, Sheng-De
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 7 - 12
  • [10] HIDS: A host based intrusion detection system for cloud computing environment
    Deshpande P.
    Sharma S.C.
    Peddoju S.K.
    Junaid S.
    Deshpande, Prachi (deprachi3@gmail.com), 2018, Springer (09) : 567 - 576