A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment

被引:26
|
作者
Gupta, Sanchika [1 ]
Kumar, Padam [1 ]
Abraham, Ajith [2 ,3 ]
机构
[1] Indian Inst Technol Roorkee, Dept Elect & Comp Engn, Roorkee 247667, Uttarakhand, India
[2] Sci Network Innovat & Res Excellence, Machine Intelligence Res Labs MIR Labs, Auburn, WA 98071 USA
[3] VSB Tech Univ Ostrava, Ctr Excellence IT4Innovat, Ostrava 70833, Czech Republic
关键词
All Open Access; Gold; Green;
D O I
10.1155/2013/364575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include software as a service, platform as a service, and infrastructure as a service. Cloud computing virtually and dynamically distributes the computing and data resources to a variety of users, based on their needs, with the use of virtualization technologies. As Cloud computing is a shared facility and is accessed remotely, it is vulnerable to various attacks including host and network based attacks (Brown 2012, and Grance 2009) and hence requires immediate attention. This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outsiders with the use of network profiling. With network profiling, a profile is created for each virtual machine (VM) in cloud that describes network behavior of each cloud user (an assigned VM). The behavior gathered is then used for determination (detection) of network attacks on cloud. The novelty of the approach lies in the early detection of network attacks with robustness and minimum complexity. The proposed technique can be deployed with minimal changes to existing cloud environment. An initial prototype implementation is verified and tested on private cloud with a fully functional implementation under progress.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] RID-Cloud: Spectral Recurrent Neural Network-Based Intrusion Detection in Cloud Environment
    Aarthi, G.
    Priya, S. Sharon
    Banu, W. Aisha
    IETE JOURNAL OF RESEARCH, 2025, 71 (02) : 499 - 510
  • [32] Cloud computing for network security intrusion detection system
    Yang, J. (jinnyang@163.com), 1600, Academy Publisher (08):
  • [33] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [34] Network Intrusion Detection System as a Service on OpenStack Cloud
    Xu, Chen
    Zhang, Ruipeng
    Xie, Mengjun
    Yang, Li
    2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP), 2019,
  • [35] Network security intrusion target detection system in the cloud
    Srirangam, Durga Prasad
    Salina, Adinarayana
    Bapu, B. R. Tapas
    Partheeban, N.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 602 - 613
  • [36] Securing Cloud from Attacks: Machine Learning Based Intrusion Detection in Cloud Sensor Networks
    Varghese, Meble
    Jose, M. Victor
    AD HOC & SENSOR WIRELESS NETWORKS, 2021, 50 (1-4) : 143 - 171
  • [37] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [38] Bayesian Classifier and Snort based Network Intrusion Detection System in Cloud Computing
    Modi, Chirag N.
    Patel, Dhiren R.
    Patel, Avi
    Muttukrishnan, Rajarajan
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [39] An intrusion detection and prevention system in cloud computing: A systematic review
    Patel, Ahmed
    Taghavi, Mona
    Bakhtiyari, Kaveh
    Celestino Junior, Joaquim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 25 - 41
  • [40] Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
    Ali, Mohammed Hasan
    Zolkipli, Mohamad Fadli
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7360 - 7363