Proposing Cloud Based Intrusion Detection System for Tracing Intruder Attacks
DOI:
https://doi.org/10.26438/ijcse/v6i4.97104Keywords:
Cloud, Intruder, IDS, Intrusion Detection System, HIDS, NIDS, AttackAbstract
Before proposing a new model and implementing it in the Intrusion Detection Systems, First find out how intrusion detection is performed on Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) offerings, along with the available host, network and hypervisor-based intrusion detection options. The ability to perform intrusion detection in the cloud is heavily dependent on the model of cloud computing. In cloud computing, most of the attacks till today traced are the remote attacks. In this paper, we are proposing a model for Cloud Based Intruder Detection System [CBIDS]. This model is created for tracing the attacks on the online storage at SaaS and PaaS layer of cloud computing and appropriately the recommended action will be taken to protect the stored data and executing the handler accordingly. Further modifications in this model will be done on the basis of obtaining requirements and gaps in tracing the attacks.
References
S 1. S. Akter, S.F.Wamba, A. Gunasekaran , R. Dubey, S. J.Childe, “How to improve firm performance using big data analytics capability and business strategy alignment?”, Elsevier, Int. J. Production Economics 182 (2016), pp.113–131
2. C. Saadi, H. Chaoui, “Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb”, International Conference on Computational Modeling and Security (CMS 2016), pp.433-442
3. Costa DG, Guedes LA (2011) “Exploiting the sensing relevancies of source nodes for optimizations invisual sensor networks.” Multimed Tools Appl 55, 2003.
4. Grance, T., Mell, P.: The nist definition of cloud computing. National Institute of Standards & Technology (NIST) (2009), http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
5. Roschke, S., Cheng, F., Meinel, C.: Intrusion detection in the cloud. In: IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp.729-734, 2009.
6. Ramya. R Securing the system using honeypot in cloud computing environment International Journal of Multidisciplinary Research and Development Volume: 2, Issue: 4, 172-176April 2015.
7. Y. Sun, Y. Luo, and all, Fast live cloning of virtual machine based on xen. In High Performance Computing and Communications HPCC ’09, 11th IEEE International Conference on pages 392-399, June 2009.
8. U. Sivarajah, M. M. Kamal, Z. Irani, V. Weerakkody, “Critical analysis of Big Data challenges and analytical methods”, Journal of Business Research (2016), pp. 1-24
9. Z. Tan, X. He, P. Nanda, J. Hu “Enhancing Big Data Security with Collaborative Intrusion Detection”, Article in IEEE Cloud Computing (2014) • January 2015, pp. 34-40.
10. Neha, Mandeep Kaur, “Enhanced Security using Hybrid Encryption Algorithm”, IJIRCCE, ISSN(Online): 2320-9801, Vol. 4, Issue 7, July 2016
11. A. Kaur, S. Singh, “An Efficient data storage security algorithm using RSA Algorithm”, IJAIEM, Volume 2, Issue 3, March 2013, ISSN 2319 – 4847, pp. 536-540.
12. A. Bhardwaj, GVB Subrahmanyam, V. Avasthi, H. Sastry, “Security Algorithms for Cloud Computing”, International Conference on Computational Modeling and Security (CMS 2016), Elsevier, Procedia Computer Science 85 ( 2016 ), pp. 535 – 542
13. J. Khan, H. Abbasa, J. Al-Muhtadia, “Survey on Mobile User's Data Privacy Threats and Defense Mechanisms”, International Workshop on Cyber Security and Digital Investigation (CSDI 2015), Elsevier, Procedia Computer Science 56 ( 2015 ), pp. 376 – 383
14. Al Haddad Zayed, H. Mostafa, M. Abdelaziz, B.Youness, “Hybrid Intrusion Detection Systems (HIDS) in Cloud Computing: Challenges and Opportunities”, IJEECSE, Volume 3, Issue 3 (June, 2016) | E-ISSN : 2348-2273, pp. 7-13
15. Shuying Li, Ya Pan, “Study on secure data storage based on cloud computing”, Bio Technology - An Indian Journal, BTAIJ, vol. 10, Issue 22, 2014 , ISSN : 0974 – 7435, pp. 13778-13783
16. U. Oktay, O. K. Sahingoz, “Proxy Network Intrusion Detection System for Cloud Computing”, ISBN: 978-1-4673-5613-8, 2013, IEEE, pp. 98-104.
17. Oktay and O.K. Sahingoz, “Attack Types and Intrusion Detection Systems in Cloud Computing”, 6th international information security & cryptology conference, Sep 2013, pp 71-76
18. C. Ambikavathi and S. K. Srivatsa, “Integrated Intrusion Detection Approach for Cloud Computing”, Indian Journal of Science and Technology, Vol 9(22), DOI: 10.17485/ijst/2016/v9i22/95170, June 2016, ISSN (Online) : 0974-5645.
19. Akash G Mohod, Satish J Alaspurkar, “Analysis of IDS for Cloud Computing”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 3, March 2013 ISSN 2319 – 4847.
20. S.N. Dhage, B.B. Meshram, “Intrusion detection system in cloud computing environment”, Int. J. Cloud Computing, Vol. 1, Nos. 2/3, 2012, pp. 261-282.
21. T. Kuldeep, Tyagi S.S and Agrawal R., Overview - Snort Intrusion Detection System in Cloud Environment, International Journal of Information and Computation Technology, ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
