Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems

被引:2
|
作者
Cherkaoui, Rachid [1 ,2 ]
Zbakh, Mostapha [1 ]
Braeken, An [2 ]
Touhafi, Abdellah [2 ]
机构
[1] Mohammed V Univ Rabat, ENSIAS Coll, ISeRT, Rabat, Morocco
[2] Vrije Univ Brussel, Ind Engn Sci Dept, INDI, Brussels, Belgium
来源
关键词
Cloud computing; Anomaly detection; Intrusion detection; Performance analysis; IDS;
D O I
10.1007/978-3-319-68179-5_18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing services are widely used nowadays and need to be more secured for an effective exploitation by the users. One of the most challenging issues in these environments is the security of the hosted data. Many cloud computing providers offer web applications for their clients, this is why the most handling attacks in cloud computing are Distributed Denial of Service (DDoS). In this paper, we provide a comparative performance analysis of intrusion detection systems (IDSs) in a real world lab. The aim is to provide an up to date study for researchers and practitioners to understand the issues related to intrusion detection and to deal with DDoS attacks. This analysis includes intrusion detection rates, time running, etc. In the experiments, we configured a cloud platform using OpenStack and an IDS monitoring the whole network traffic of the web server configured. The results show that Suricata drops fewer packets than Bro and Snort successively when a DDoS attack is happening and detect more malicious packets.
引用
收藏
页码:206 / 213
页数:8
相关论文
共 50 条
  • [1] Performance Analysis of Intrusion Detection Systems in the Cloud Computing
    Abdelaziz, Ettaoufik
    Mohamed, Ouzzif
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 136 - 143
  • [2] A systematic literature review of intrusion detection systems in the cloud-based IoT environments
    Luo, Gang
    Chen, Zhiyuan
    Mohammed, Bayan Omar
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (10):
  • [3] A survey of cloud-based network intrusion detection analysis
    Keegan, Nathan
    Ji, Soo-Yeon
    Chaudhary, Aastha
    Concolato, Claude
    Yu, Byunggu
    Jeong, Dong Hyun
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2016, 6
  • [4] Performance Analysis and Security Based on Intrusion Detection and Prevention Systems in Cloud Data Centers
    El Mir, Iman
    Haqiq, Abdelkrim
    Kim, Dong Seong
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS 2016), 2017, 552 : 456 - 465
  • [5] A Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    [J]. 2021 26TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2021,
  • [6] Performance Analysis of Anomaly Based Network Intrusion Detection Systems
    Abedin, Md. Zainal
    Siddiquee, Kazy Noor-e-Alam
    Bhuyan, M. S.
    Karim, Razuan
    Hossain, Mohammad Shahadat
    Andersson, Karl
    [J]. PROCEEDINGS OF THE 2018 43RD ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS), 2018, : 1 - 7
  • [7] The analysis performance of an Intrusion Detection Systems based on Neural Network
    El Farissi, Ilhame
    Saber, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    Belkasmi, Mohammed Ghaouth
    [J]. 2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 145 - 151
  • [8] Extrusion detection of illegal files in cloud-based systems
    Hegarty, Rob
    Haggerty, John
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (03) : 150 - 158
  • [9] CLOUD-BASED ARCHITECTURE FOR PERFORMANCE MANAGEMENT SYSTEMS FOR SATES
    Rusaneanu, Alexandra
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 79 - 83
  • [10] Cloud-based Performance Testing of Network Management Systems
    Ganon, Zohar
    Zilbershtein, Itai E.
    [J]. CAMAD: 2009 IEEE 14TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS, 2009, : 26 - 31