An Integrated and Improved Scheme for Efficient Intrusion Detection in Cloud
Keywords:
Cloud Security, Distributed Denial of Service Attack, Intrusion Detection System, Suricata, Snort, Hybrid IDSAbstract
Cloud computing environments are easy targeted by intruders and pose new risks and threats to an organization because of its service and operational models, the underlying technologies, and their distributed nature that relies on the network for its working. However, IDSs are among the efficient security mechanisms that can handle most of the threats of cloud computing. In spite this, several deficiencies of current IDSs technologies and solutions hinder their adoption in a cloud. The proposed work focuses on developing improved IDS that provides an integrated approach of both techniques i.e. anomaly based as well as knowledge based whether implement on network or host based IDS for cloud computing to detect masquerade, host, and network attacks and provides efficient deployments to detect DDoS attacks. The work comprises of integration of two powerful open source tool Suricata and Snort together with the proposed DDoS detection rule make the working of IDS more effective and high alarm rate generating Hybrid IDS.
References
Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, “Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
V.P.Muthukumar and R.Saranya, “A Survey on Security Threats and Attacks in Cloud Computing”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.
Sudhansu Ranjan Lenka and Bikram Keshari Rath , “HTTP service based Network Intrusion Detection System in Cloud Computing”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.118-123, 2015.
Mithilesh Mittal, Pradeep Sharma and Pankaj Kumar Gehlot, “A Comparative Study of Security Issues& Challenges of Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.9-15, 2013.
PK. Rajendran , “Hybrid intrusion detection algorithm for private cloud”, Indian Journal of Science and Technology, Vol.8, Issue.35, pp.1-10, 2015
HM. Alsafi , WM. Abduallah, “IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment”, International Journal of Computing and Information Technology, Vol.4, Issue.1, pp.1-6, 2014.
Amirreza Zarrabi, Alireza, “Internet Intrusion Detection System Service in a Cloud”, International Journal of Computer Science Issues, Vol.9, Issue.5, pp.308-315, 2012
Ahmed Patel, Mona Taghavi, “An intrusion detection and prevention system in cloud computing: A systematic review”, Journal of network and computer applications, Vol.36, Issue.1, pp.25-41, 2013.
Vineet Chaturvedi, Ashok Verma and Neha Agarwal, “A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.16-20, 2013.
M. Chowdhary, S. Suri, M. Bhutani, “Comparative Study of Intrusion Detection System”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.197-200, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.