Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1980022.1980076acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicwetConference Proceedingsconference-collections
research-article

Intrusion detection system in cloud computing environment

Published: 25 February 2011 Publication History

Abstract

In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As "Prevention is better than cure", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.

References

[1]
About.com http://netsecurity.about.com/cs/hackertools/a/aa030504.htm
[2]
Amir Vahid Dastjerdi, Kamalrulnizam Abu Bakar, Sayed Gholam Hassan Tabatabaei, "Distributed Intrusion Detection in Clouds Using Mobile Agents," advcomp, pp. 175--180, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, 2009.
[3]
Balachandra Reddy Kandukuri, Ramakrishna Paturi V., Atanu Rakshit, "Cloud Security Issues," scc, pp. 517--520, 2009 IEEE International Conference on Services Computing, 2009.
[4]
Charles P. Pfleeger, "Security in Computing", Pearson Education.
[5]
Claudio Mazzariello, Roberto Bifulco and Roberto Canonico, Integrating a Network IDS into an Open Source Cloud Computing Environment, 2010, Sixth International conference on Information Assurance and Security.
[6]
Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", 2009 17th International Workshop on Quality of Service, Volume: D, Issue: 978, Publisher: Ieee, Pages: 1--9.
[7]
Daniel Nurmi, Rich Wolski, Chris Grzegorczyk, Graziano Obertelli, Sunil Soman, Lamia Youseff, Dmitrii Zagorodnov, "The Eucalyptus Open-Source Cloud-Computing System," ccgrid, pp. 124--131, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009.
[8]
Data Security http://www.exforsys.com/tutorials/cloud-computing/cloud-computing-security.html
[9]
Dorothy E. Denning, An Intrusion-Detection Model, IEEE Transactions on Software Engineering - Special issue on computer security and privacy.
[10]
How secure is cloud computing? http://www.technologyreview.com/web/23951
[11]
Kleber Vieira, Alexandre Schulter, Carlos Westphall, Carla Westphall, "Intrusion Detection for Grid and Cloud Computing," IT Professional, vol. 12, no. 4, pp. 38--43, July/Aug. 2010.
[12]
Matt Bishop, "Computer Security: Art and Science", Addison Wesley, ISBN 0-201-44099-7.
[13]
Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono, "On Technical Security Issues in Cloud Computing," cloud, pp. 109--116, 2009 IEEE International Conference on Cloud Computing, 2009.
[14]
The Eucalyptus website www.eucalyptus.com.

Cited By

View all
  • (2023)Local Self-attention-based Hybrid Multiple Instance Learning for Partial Spoof Speech DetectionACM Transactions on Intelligent Systems and Technology10.1145/361654014:5(1-18)Online publication date: 9-Oct-2023
  • (2022)Intrusion (Hybrid) Detection System for Cloud Computing EnvironmentsAdvances in Data Science and Management10.1007/978-981-16-5685-9_45(463-471)Online publication date: 13-Feb-2022
  • (2022)An Overview of Explainable Artificial Intelligence for Cyber SecurityExplainable Artificial Intelligence for Cyber Security10.1007/978-3-030-96630-0_2(31-58)Online publication date: 19-Apr-2022
  • Show More Cited By

Index Terms

  1. Intrusion detection system in cloud computing environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICWET '11: Proceedings of the International Conference & Workshop on Emerging Trends in Technology
    February 2011
    1385 pages
    ISBN:9781450304498
    DOI:10.1145/1980022
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Thakur College Of Engg. & Tech: Thakur College Of Engineering & Technology

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 February 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cloud computing
    2. intrusion detection
    3. intrusion prevention

    Qualifiers

    • Research-article

    Conference

    ICWET '11
    Sponsor:
    • Thakur College Of Engg. & Tech

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 12 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Local Self-attention-based Hybrid Multiple Instance Learning for Partial Spoof Speech DetectionACM Transactions on Intelligent Systems and Technology10.1145/361654014:5(1-18)Online publication date: 9-Oct-2023
    • (2022)Intrusion (Hybrid) Detection System for Cloud Computing EnvironmentsAdvances in Data Science and Management10.1007/978-981-16-5685-9_45(463-471)Online publication date: 13-Feb-2022
    • (2022)An Overview of Explainable Artificial Intelligence for Cyber SecurityExplainable Artificial Intelligence for Cyber Security10.1007/978-3-030-96630-0_2(31-58)Online publication date: 19-Apr-2022
    • (2021)An Approach to Cloud Computing for Medical Image AnalysisAI Innovation in Medical Imaging Diagnostics10.4018/978-1-7998-3092-4.ch010(164-193)Online publication date: 2021
    • (2021)A Design of an Integrated Cloud-based Intrusion Detection System with Third Party Cloud ServiceOpen Computer Science10.1515/comp-2020-021411:1(365-379)Online publication date: 8-Jun-2021
    • (2021)Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel ApproachAdvances in Security, Networks, and Internet of Things10.1007/978-3-030-71017-0_10(129-145)Online publication date: 11-Jul-2021
    • (2020)Distributed Architecture of Snort IDS in Cloud EnvironmentIntelligent Systems Design and Applications10.1007/978-3-030-49342-4_10(100-111)Online publication date: 15-Aug-2020
    • (2019)Survey of intrusion detection techniques and architectures in cloud computingInternational Journal of High Performance Computing and Networking10.5555/3319261.331926713:2(184-198)Online publication date: 1-Jan-2019
    • (2019)A Review of Intrusion Detection Systems in Cloud ComputingCloud Security10.4018/978-1-5225-8176-5.ch003(54-83)Online publication date: 2019
    • (2019)A New Approach in Cloud Computing User AuthenticationWeb Services10.4018/978-1-5225-7501-6.ch072(1393-1410)Online publication date: 2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media