An Integrated approach for effective Intrusion Detection with Elasticsearch
Keywords:
Cloud Security, Distributed Denial of Service Attack (DDoS), Intrusion Detection System (IDS), Suricata, Snort, Hybrid IDSAbstract
Cloud computing environments are easy targets for intruders and pose new risks and threats to an organization because of their service and operational models, the underlying technologies, and their distributed nature that relies on the network for its working. However, IDSs are among the efficient security mechanisms that can handle most of the threats of cloud computing. In spite this, several deficiencies of current IDSs technologies and solutions hinder their adoption in a cloud. The proposed work focuses on developing improved IDS that provides an integrated approach of both techniques i.e. anomaly based as well as knowledge based whether implement on network or host based IDS for cloud computing to detect masquerade, host, and network attacks and provides efficient deployments to detect DDoS attacks. The work comprises of integration of two powerful open source tool Suricata and Snort together with the proposed DDoS detection rule make the working of IDS more effective and high alarm rate generating Hybrid IDS.
References
http://www.nist.gov/itl/cloud/upload/cloud-defv15.pdf
M. Madhavi, “An Approach for Intrusion Detection System in Cloud Computing”, Elsevier, (2012).
U. Oktay, O.K. Sahingoz et al, “Attack Types and Intrusion Detection System in Cloud Computing”, Elsevier, (2013)
Jabej J, Dr.B. Muthu Kumar, “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach”, Science Direct, 2015.
Nandita Sengupta, Ramya Chinnasamy “Contriving Hybrid DESCAST Algorithm for Cloud Security”, Elsevier, 2015.
Anitha H M, P.Jayarekha “Security Challenges of Virtualization in Cloud Environment”, IJCSE, 2018.
Praveen Kumar Rajendran, B. Muthukumar, G.Nagarajan, “Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach”, Elsevier, 2015
Hassen Mohammed Alsafi , Wafaa Mustafa Abduallah, “IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment”, Elsevier, 2014
Amirreza Zarrabi, Alireza, “Internet Intrusion Detection System Service in a Cloud”, 2012
Ahmed Patel, Mona Taghavi, et al, “An intrusion detection and prevention system in cloud computing: A systematic review”, Elsevier , 2012
Seyed Mojtaba Hosseini Bamakan, et al., “New Intrusion Detection Approach using PSO based Multiple Criteria Linear Programming”, Elsevier, 2015
Cong Wang, Qian Wang, and Kui Ren, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010.
Dimitrios Zissis, Dimitrios Lekkas “Addressing cloud computing security issues” Future Generation Computer Systems, Elsevier, (2012).
Kshetri,N. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy (2012)
http://www.nist.gov/itl/cloud/upload/cloud-defv15.pdf
K. Salah, J. M. Alcaraz-Calero,S. Zeadally, S. Almulla and M. Alzaabi “Using Cloud Computing to Implement a Security Overlay Network”, IEEE, Security and Privacy, (2011).
N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing", in: IEEE International Conference on Distributed ComputingSystems, ICDCS’11, (2011), pp. 393–402
S. Marston et al. / Decision Support Systems 51 (2011) 176–189
Cong Wang, Qian Wang, and Kui Ren, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing", IEEE INFOCOM (2010).
Shuai Zhang and Shufen Zhang “Cloud Computing Research and Development Trend”, IEEE, Second International Conference on Future Networks, (2010)
J. Yao, S. Chen, S. Nepal, D. Levy, J. Zic, "Truststore: making Amazon S3 trustworthy with services composition", in: Proceedings of the ” 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGRID’08, Melbourne, Australia, (2010), pp. 600–605
Goscinski, M. Brock / Future Generation Computer Systems 26 (2010) 947_970
Groce, J. Katz, ”A new framework for efficient password-based authenticated key exchange”, in: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, USA, (2010), pp. 516–525
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, "Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems" 25 (2009) 599–616.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.