HIDS: A host based intrusion detection system for cloud computing environment

被引:71
|
作者
Deshpande P. [1 ]
Sharma S.C. [1 ]
Peddoju S.K. [2 ]
Junaid S. [2 ]
机构
[1] Department of Applied Science & Engineering, Indian Institute of Technology Roorkee, Roorkee, 247667, Uttarakhand
[2] Department of Computer Science & Engineering, Indian Institute of Technology Roorkee, Roorkee, 247667, Uttarakhand
关键词
Cloud; Detection; Host based IDS; Network; OpenNebula; Security; System call traces; Virtual machine;
D O I
10.1007/s13198-014-0277-7
中图分类号
学科分类号
摘要
The paper reports a host based intrusion detection model for Cloud computing environment along with its implementation and analysis. This model alerts the Cloud user against the malicious activities within the system by analyzing the system call traces. The method analyses only selective system call traces, the failed system call trace, rather than all. An early detection of intrusions with reduced computational burden can be possible with this feature. The reported model provides security as a service (SecaaS) in the infrastructure layer of the Cloud environment. Implementation result shows 96 % average intrusion detection sensitivity. © 2014, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:567 / 576
页数:9
相关论文
共 50 条
  • [21] Cloud computing for network security intrusion detection system
    Yang, J. (jinnyang@163.com), 1600, Academy Publisher (08):
  • [22] A Collaborative Intrusion Detection and Prevention System in Cloud Computing
    Hassani, Mohamed
    Lebbat, Adil
    Talial, Saida
    Imedromi, Hicham
    AFRICON, 2013, 2013,
  • [23] Poster: Developing an Intrusion Detection System for Cloud Computing
    Dang Duy Thang
    Le Hoai Nam
    Nguyen Tan Khoi
    MOBISYS'16: COMPANION COMPANION PUBLICATION OF THE 14TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2016, : 20 - 20
  • [24] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [25] Intrusion Detection System in Cloud Computing: Challenges and Opportunities
    Mehmood, Yasir
    Shibli, Muhammad Awais
    Habiba, Umme
    Masood, Rahat
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 59 - 66
  • [26] An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
    Alqahtani, Saeed M.
    Al Balushi, Maqbool
    John, Robert
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 135 - 141
  • [27] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [28] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283
  • [29] Securing Cloud Environment using a String based Intrusion Detection System
    Raj, R. Sundar
    Bhaskaran, V. Murali
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [30] A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment
    Ma, Xiaoyu
    Fu, Xiao
    Luo, Bin
    Du, Xiaojiang
    Guizani, Mohsen
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,