An Adaptive Intrusion Detection Scheme for Cloud Computing

被引:2
|
作者
Ibrahim, Nurudeen Mahmud [1 ]
Zainal, Anazida [1 ]
机构
[1] Univ Teknol Malaysia, Johor Baharu, Malaysia
关键词
Anomaly Detection; Ant Colony Optimization; Binary Segmentation; Cloud Security; DDoS; Machine Learning; Stochastic Gradient Descent; Time Series; DETECTION SYSTEM; R-PACKAGE; CHANGEPOINT; COLONY;
D O I
10.4018/IJSIR.2019100104
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To provide dynamic resource management, live virtual machine migration is used to move a virtual machine from one host to another. However, virtual machine migration poses challenges to cloud intrusion detection systems because movement of VMs from one host to another makes it difficult to create a consistent normal profile for anomaly detection. Hence, there is a need to provide an adaptive anomaly detection system capable of adapting to changes that occur in the cloud data during VM migration. To achieve this, the authors proposed a scheme for adaptive IDS for Cloud computing. The proposed adaptive scheme is comprised of four components: an ant colony optimization-based feature selection component, a statistical time series change point detection component, adaptive classification, and model update component, and a detection component. The proposed adaptive scheme was evaluated using simulated datasets collected from vSphere and performance comparison shows improved performance over existing techniques.
引用
收藏
页码:53 / 70
页数:18
相关论文
共 50 条
  • [41] A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing
    Alam, Shadab
    Shuaib, Mohammed
    Samad, Abdus
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 231 - 240
  • [42] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [43] An Enhanced Approach for Intrusion Detection in Virtual Network of Cloud Computing
    Kadam, Deeksha
    Patil, Rajendra
    Modi, Chirag
    2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 80 - 87
  • [44] Dual stage ensemble technique for intrusion detection in cloud computing
    Neelakantan, P.
    Yadav, N. Sudhakar
    WEB INTELLIGENCE, 2023, 21 (01) : 19 - 35
  • [45] An intrusion detection and prevention system in cloud computing: A systematic review
    Patel, Ahmed
    Taghavi, Mona
    Bakhtiyari, Kaveh
    Celestino Junior, Joaquim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 25 - 41
  • [46] A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing
    Bakshi, Aditya
    Sunanda
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 358 - 378
  • [47] Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview
    Rana, Pooja
    Batra, Isha
    Malik, Arun
    Imoize, Agbotiname Lucky
    Kim, Yongsung
    Pani, Subhendu Kumar
    Goyal, Nitin
    Kumar, Arun
    Rho, Seungmin
    COMPLEXITY, 2022, 2022
  • [48] Mobile Agents with Cryptographic Traces for Intrusion Detection in the Cloud Computing
    Idrissi, Hind
    Ennahbaoui, Mohammed
    Souidi, El Mamoun
    El Hajji, Said
    INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 : 179 - 186
  • [49] Study of Intrusion Detection System for DDoS Attacks in Cloud Computing
    Kumar, Naresh
    Sharma, Shalini
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [50] A differential game model of intrusion detection system in cloud computing
    Li, Zhi
    Xu, Haitao
    Liu, Yanzhu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (01):