An Integrated approach for effective Intrusion Detection with Elasticsearch

Authors

  • Piyush Pareta Department of Computer Science and Engineering. RKDF College of Engineering, Bhopal, India
  • Manish Rai Department of Computer Science and Engineering. RKDF College of Engineering, Bhopal, India
  • Mohit Gangwar Department of Computer Science and Engineering. RKDF College of Engineering, Bhopal, India

Keywords:

Cloud Security, Distributed Denial of Service Attack (DDoS), Intrusion Detection System (IDS), Suricata, Snort, Hybrid IDS

Abstract

Cloud computing environments are easy targets for intruders and pose new risks and threats to an organization because of their service and operational models, the underlying technologies, and their distributed nature that relies on the network for its working. However, IDSs are among the efficient security mechanisms that can handle most of the threats of cloud computing. In spite this, several deficiencies of current IDSs technologies and solutions hinder their adoption in a cloud. The proposed work focuses on developing improved IDS that provides an integrated approach of both techniques i.e. anomaly based as well as knowledge based whether implement on network or host based IDS for cloud computing to detect masquerade, host, and network attacks and provides efficient deployments to detect DDoS attacks. The work comprises of integration of two powerful open source tool Suricata and Snort together with the proposed DDoS detection rule make the working of IDS more effective and high alarm rate generating Hybrid IDS.

 

References

http://www.nist.gov/itl/cloud/upload/cloud-defv15.pdf

M. Madhavi, “An Approach for Intrusion Detection System in Cloud Computing”, Elsevier, (2012).

U. Oktay, O.K. Sahingoz et al, “Attack Types and Intrusion Detection System in Cloud Computing”, Elsevier, (2013)

Jabej J, Dr.B. Muthu Kumar, “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach”, Science Direct, 2015.

Nandita Sengupta, Ramya Chinnasamy “Contriving Hybrid DESCAST Algorithm for Cloud Security”, Elsevier, 2015.

Anitha H M, P.Jayarekha “Security Challenges of Virtualization in Cloud Environment”, IJCSE, 2018.

Praveen Kumar Rajendran, B. Muthukumar, G.Nagarajan, “Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach”, Elsevier, 2015

Hassen Mohammed Alsafi , Wafaa Mustafa Abduallah, “IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment”, Elsevier, 2014

Amirreza Zarrabi, Alireza, “Internet Intrusion Detection System Service in a Cloud”, 2012

Ahmed Patel, Mona Taghavi, et al, “An intrusion detection and prevention system in cloud computing: A systematic review”, Elsevier , 2012

Seyed Mojtaba Hosseini Bamakan, et al., “New Intrusion Detection Approach using PSO based Multiple Criteria Linear Programming”, Elsevier, 2015

Cong Wang, Qian Wang, and Kui Ren, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010.

Dimitrios Zissis, Dimitrios Lekkas “Addressing cloud computing security issues” Future Generation Computer Systems, Elsevier, (2012).

Kshetri,N. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy (2012)

http://www.nist.gov/itl/cloud/upload/cloud-defv15.pdf

K. Salah, J. M. Alcaraz-Calero,S. Zeadally, S. Almulla and M. Alzaabi “Using Cloud Computing to Implement a Security Overlay Network”, IEEE, Security and Privacy, (2011).

N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing", in: IEEE International Conference on Distributed ComputingSystems, ICDCS’11, (2011), pp. 393–402

S. Marston et al. / Decision Support Systems 51 (2011) 176–189

Cong Wang, Qian Wang, and Kui Ren, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing", IEEE INFOCOM (2010).

Shuai Zhang and Shufen Zhang “Cloud Computing Research and Development Trend”, IEEE, Second International Conference on Future Networks, (2010)

J. Yao, S. Chen, S. Nepal, D. Levy, J. Zic, "Truststore: making Amazon S3 trustworthy with services composition", in: Proceedings of the ” 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGRID’08, Melbourne, Australia, (2010), pp. 600–605

Goscinski, M. Brock / Future Generation Computer Systems 26 (2010) 947_970

Groce, J. Katz, ”A new framework for efficient password-based authenticated key exchange”, in: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, USA, (2010), pp. 516–525

R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, "Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems" 25 (2009) 599–616.

Downloads

Published

2018-06-30

How to Cite

[1]
P. Pareta, M. Rai, and M. Gangwar, “An Integrated approach for effective Intrusion Detection with Elasticsearch”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 6, no. 3, pp. 13–17, Jun. 2018.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.