An Adaptive Intrusion Detection Scheme for Cloud Computing

被引:2
|
作者
Ibrahim, Nurudeen Mahmud [1 ]
Zainal, Anazida [1 ]
机构
[1] Univ Teknol Malaysia, Johor Baharu, Malaysia
关键词
Anomaly Detection; Ant Colony Optimization; Binary Segmentation; Cloud Security; DDoS; Machine Learning; Stochastic Gradient Descent; Time Series; DETECTION SYSTEM; R-PACKAGE; CHANGEPOINT; COLONY;
D O I
10.4018/IJSIR.2019100104
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To provide dynamic resource management, live virtual machine migration is used to move a virtual machine from one host to another. However, virtual machine migration poses challenges to cloud intrusion detection systems because movement of VMs from one host to another makes it difficult to create a consistent normal profile for anomaly detection. Hence, there is a need to provide an adaptive anomaly detection system capable of adapting to changes that occur in the cloud data during VM migration. To achieve this, the authors proposed a scheme for adaptive IDS for Cloud computing. The proposed adaptive scheme is comprised of four components: an ant colony optimization-based feature selection component, a statistical time series change point detection component, adaptive classification, and model update component, and a detection component. The proposed adaptive scheme was evaluated using simulated datasets collected from vSphere and performance comparison shows improved performance over existing techniques.
引用
收藏
页码:53 / 70
页数:18
相关论文
共 50 条
  • [21] A Cooperative Intrusion Detection Model for Cloud Computing Networks
    Teng, Shaohua
    Zheng, Chaoyu
    Zhu, Haibin
    Liu, Dongning
    Zhang, Wei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 107 - 118
  • [22] A Collaborative Intrusion Detection and Prevention System in Cloud Computing
    Hassani, Mohamed
    Lebbat, Adil
    Talial, Saida
    Imedromi, Hicham
    AFRICON, 2013, 2013,
  • [23] Poster: Developing an Intrusion Detection System for Cloud Computing
    Dang Duy Thang
    Le Hoai Nam
    Nguyen Tan Khoi
    MOBISYS'16: COMPANION COMPANION PUBLICATION OF THE 14TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2016, : 20 - 20
  • [24] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [25] An Improved Distributed Intrusion Detection Architecture for Cloud Computing
    Ghorbani, Hamid Reza
    Hashemi, Mahmoud Reza
    COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, CNDS 2013, 2014, 428 : 105 - 116
  • [26] HIDCC: A hybrid intrusion detection approach in cloud computing
    Hatef, Mohammad Amin
    Shaker, Vahid
    Jabbarpour, Mohammad Reza
    Jung, Jason
    Zarrabi, Houman
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (03):
  • [27] Towards Targeted Intrusion Detection Deployments in Cloud Computing
    Ahmed, Norman
    Bhargava, Bharat
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2015, 6 (02): : 129 - 139
  • [28] A Survey of Intrusion Detection Systems for Cloud Computing Environment
    Chiba, Zouhair
    Abghour, Noureddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [29] Intrusion Detection System in Cloud Computing: Challenges and Opportunities
    Mehmood, Yasir
    Shibli, Muhammad Awais
    Habiba, Umme
    Masood, Rahat
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 59 - 66
  • [30] An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
    Alqahtani, Saeed M.
    Al Balushi, Maqbool
    John, Robert
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 135 - 141