An Improved Distributed Intrusion Detection Architecture for Cloud Computing

被引:3
|
作者
Ghorbani, Hamid Reza [1 ]
Hashemi, Mahmoud Reza [1 ]
机构
[1] Univ Tehran, Coll Engn, Sch Elect & Comp Engn, Tehran, Iran
关键词
Cloud computing; Intrusion detection system; Snort; Distributed intrusion detection;
D O I
10.1007/978-3-319-10903-9_9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, cloud computing has provided a framework for dynamic and saleable use of a wide range of services. Despite the advantages of cloud, security is still one of its most challenging issues. Intrusion detection systems, as a common security tool, can be used to increase the level of security in cloud environments. However, some of the inherent features of the cloud, such as being highly distributed, the variety and dynamism of its services, and difference security needs of each user or cloud service has made conventional IDSs inefficient for this environment. In this paper, an efficient architecture for intrusion detection has been proposed for cloud computing. For this purpose, we classify services, in terms of their security requirements, into groups of services with similar security constraints. This way the intrusion detection process can be customized according to the specific attacks that usually target the services of each group. The proposed architecture has been evaluated using Snort and by customizing it for each cloud service security requirement. Simulations indicate that the proposed architecture has been able to decrease the total time of traffic analysis against attacks by 17.5 % on average, while having the same detection rate and not losing the accuracy.
引用
收藏
页码:105 / 116
页数:12
相关论文
共 50 条
  • [21] An Efficient Architecture for Distributed Intrusion Detection System
    Hakimi, Zahra
    Faez, Karim
    Barati, Morteza
    [J]. 2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [22] A Multi-agent System-Based Distributed Intrusion Detection System for a Cloud Computing
    Achbarou, Omar
    El Kiram, My Ahmed
    Bourkoukou, Outmane
    Elbouanani, Salim
    [J]. NEW TRENDS IN MODEL AND DATA ENGINEERING (MEDI 2018), 2018, 929 : 98 - 107
  • [23] Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey
    Samkari, Esraa
    Alsuwat, Hatim
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 67 - 74
  • [24] TJIDS: An intrusion detection architecture for distributed network
    Xue, Q
    Sun, JZ
    Wei, ZC
    [J]. CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 709 - 712
  • [25] Unsupervised Outlier Detection Technique for Intrusion Detection in Cloud Computing
    Kumar, Manoj
    Mathur, Robin
    [J]. 2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [26] Improved Cloud Computing Architecture for the Internet of Things
    Chen, Xiao-jun
    Chen, Bao-ding
    Jiang, Xiao-ming
    Chen, Xiao-bo
    Cai, Wen-hong
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (04): : 683 - 693
  • [27] A Collaborative Intrusion Detection and Prevention System in Cloud Computing
    Hassani, Mohamed
    Lebbat, Adil
    Talial, Saida
    Imedromi, Hicham
    [J]. AFRICON, 2013, 2013,
  • [28] Poster: Developing an Intrusion Detection System for Cloud Computing
    Dang Duy Thang
    Le Hoai Nam
    Nguyen Tan Khoi
    [J]. MOBISYS'16: COMPANION COMPANION PUBLICATION OF THE 14TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2016, : 20 - 20
  • [29] Performance Analysis of Intrusion Detection Systems in the Cloud Computing
    Abdelaziz, Ettaoufik
    Mohamed, Ouzzif
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 136 - 143
  • [30] Collaborative Intrusion Detection as a Service in Cloud Computing Environment
    Liang, Hong
    Ge, Yufei
    Wang, Wenjiao
    Chen, Lin
    [J]. PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 476 - 480