An Integrated and Improved Scheme for Efficient Intrusion Detection in Cloud

Authors

  • Prachi Tembhare Dept. of Computer Technology and Application, R.G.P.V., Bhopal, India
  • Neeraj Shukla Dept. of Computer Technology and Application, R.G.P.V., Bhopal, India

Keywords:

Cloud Security, Distributed Denial of Service Attack, Intrusion Detection System, Suricata, Snort, Hybrid IDS

Abstract

Cloud computing environments are easy targeted by intruders and pose new risks and threats to an organization because of its service and operational models, the underlying technologies, and their distributed nature that relies on the network for its working. However, IDSs are among the efficient security mechanisms that can handle most of the threats of cloud computing. In spite this, several deficiencies of current IDSs technologies and solutions hinder their adoption in a cloud. The proposed work focuses on developing improved IDS that provides an integrated approach of both techniques i.e. anomaly based as well as knowledge based whether implement on network or host based IDS for cloud computing to detect masquerade, host, and network attacks and provides efficient deployments to detect DDoS attacks. The work comprises of integration of two powerful open source tool Suricata and Snort together with the proposed DDoS detection rule make the working of IDS more effective and high alarm rate generating Hybrid IDS.

 

References

Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, “Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.

V.P.Muthukumar and R.Saranya, “A Survey on Security Threats and Attacks in Cloud Computing”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.

Sudhansu Ranjan Lenka and Bikram Keshari Rath , “HTTP service based Network Intrusion Detection System in Cloud Computing”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.118-123, 2015.

Mithilesh Mittal, Pradeep Sharma and Pankaj Kumar Gehlot, “A Comparative Study of Security Issues& Challenges of Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.9-15, 2013.

PK. Rajendran , “Hybrid intrusion detection algorithm for private cloud”, Indian Journal of Science and Technology, Vol.8, Issue.35, pp.1-10, 2015

HM. Alsafi , WM. Abduallah, “IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment”, International Journal of Computing and Information Technology, Vol.4, Issue.1, pp.1-6, 2014.

Amirreza Zarrabi, Alireza, “Internet Intrusion Detection System Service in a Cloud”, International Journal of Computer Science Issues, Vol.9, Issue.5, pp.308-315, 2012

Ahmed Patel, Mona Taghavi, “An intrusion detection and prevention system in cloud computing: A systematic review”, Journal of network and computer applications, Vol.36, Issue.1, pp.25-41, 2013.

Vineet Chaturvedi, Ashok Verma and Neha Agarwal, “A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.16-20, 2013.

M. Chowdhary, S. Suri, M. Bhutani, “Comparative Study of Intrusion Detection System”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.197-200, 2014.

Downloads

Published

2017-06-30

How to Cite

[1]
P. Tembhare and N. Shukla, “An Integrated and Improved Scheme for Efficient Intrusion Detection in Cloud”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 3, pp. 74–78, Jun. 2017.

Issue

Section

Research Article