An Improved Distributed Intrusion Detection Architecture for Cloud Computing

被引:3
|
作者
Ghorbani, Hamid Reza [1 ]
Hashemi, Mahmoud Reza [1 ]
机构
[1] Univ Tehran, Coll Engn, Sch Elect & Comp Engn, Tehran, Iran
关键词
Cloud computing; Intrusion detection system; Snort; Distributed intrusion detection;
D O I
10.1007/978-3-319-10903-9_9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, cloud computing has provided a framework for dynamic and saleable use of a wide range of services. Despite the advantages of cloud, security is still one of its most challenging issues. Intrusion detection systems, as a common security tool, can be used to increase the level of security in cloud environments. However, some of the inherent features of the cloud, such as being highly distributed, the variety and dynamism of its services, and difference security needs of each user or cloud service has made conventional IDSs inefficient for this environment. In this paper, an efficient architecture for intrusion detection has been proposed for cloud computing. For this purpose, we classify services, in terms of their security requirements, into groups of services with similar security constraints. This way the intrusion detection process can be customized according to the specific attacks that usually target the services of each group. The proposed architecture has been evaluated using Snort and by customizing it for each cloud service security requirement. Simulations indicate that the proposed architecture has been able to decrease the total time of traffic analysis against attacks by 17.5 % on average, while having the same detection rate and not losing the accuracy.
引用
收藏
页码:105 / 116
页数:12
相关论文
共 50 条
  • [1] A Distributed Intrusion Detection Scheme for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2020, 11 (01) : 68 - 82
  • [2] A Model for Adaptive and Distributed Intrusion Detection for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    [J]. 2018 SEVENTH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE (ICT-ISPC), 2018, : 12 - +
  • [3] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283
  • [4] An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
    Neeraj Kumar
    Jaskaran Preet Singh
    Rasmeet S. Bali
    Sudip Misra
    Sana Ullah
    [J]. Cluster Computing, 2015, 18 : 1263 - 1283
  • [5] An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
    Kumar, Neeraj
    Singh, Jaskaran Preet
    Bali, Rasmeet S.
    Misra, Sudip
    Ullah, Sana
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2015, 18 (03): : 1263 - 1283
  • [6] Distributed Intrusion Detection System using Mobile Agents in Cloud Computing Environment
    Mehmood, Yasir
    Kanwal, Ayesha
    Shibli, Muhammad Awais
    Masood, Rahat
    [J]. 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 1 - 8
  • [7] Distributed Intrusion Detection Based on Cloud Computing in Cyber Physical Power System
    Shi, Congcong
    Li, Nige
    Cao, Wantian
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 588 - 593
  • [8] Intrusion Detection for Grid and Cloud Computing
    Vieira, Kleber
    Schulter, Alexandre
    Westphall, Carlos Becker
    Westphall, Carla Merkle
    [J]. IT PROFESSIONAL, 2010, 12 (04) : 38 - 43
  • [9] A Circular Chain Intrusion Detection for Cloud Computing based on improved AdjointVM Approach
    Oktay, Ucman
    Aydin, Muhammed Ali
    Sahingoz, Ozgur Koray
    [J]. 14TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2013, : 201 - 206
  • [10] An advanced intrusion detection framework for cloud computing
    Ficco, Massimo
    Venticinque, Salvatore
    Di Martino, Beniamino
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2013, 28 (06): : 401 - 411