We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey on Intrusion Detection Systems for Cloud Computing Environment

by Uttam Kumar, Bhavesh N. Gohil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 1
Year of Publication: 2015
Authors: Uttam Kumar, Bhavesh N. Gohil
10.5120/19150-0573

Uttam Kumar, Bhavesh N. Gohil . A Survey on Intrusion Detection Systems for Cloud Computing Environment. International Journal of Computer Applications. 109, 1 ( January 2015), 6-15. DOI=10.5120/19150-0573

@article{ 10.5120/19150-0573,
author = { Uttam Kumar, Bhavesh N. Gohil },
title = { A Survey on Intrusion Detection Systems for Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 1 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number1/19150-0573/ },
doi = { 10.5120/19150-0573 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:38.627663+05:30
%A Uttam Kumar
%A Bhavesh N. Gohil
%T A Survey on Intrusion Detection Systems for Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 1
%P 6-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is a newly emerged technology. It is getting popularity day by day due to its amazing services. The applications and services based on the cloud are emerging day by day. Due to networked nature of the cloud, resources, data and applications are vulnerable to the attack in cloud environment. So Intrusion Detection Systems (IDS) are employed in the cloud to detect malicious behaviour in the network and in the host. IDS monitors network or host system activities by collecting network information, and analyzes this information for malicious activities and generate alarms, if intrusion takes place. In this paper we surveyed various types of Intrusion Detection Systems proposed over the years for Cloud Computing environment.

References
  1. Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf 2011. NIST SP 500-292, "NIST Cloud Computing Reference Architecture".
  2. Ashley Chonka, Yang Xiang, Wanlei Zhou, Alessio Bonti 2011. "Cloud security defense to protect cloud computing against HTTP-DoS and XML-DoS attacks", Journal of Network and Computer Applications, Vol. 34, Issue 4, pp. 1097-1107.
  3. Rootkit: http://en. wikipedia. org/wiki/Rootkit (Accessed 30 April 2013)
  4. Joanna Rutkowska 2006. "Subverting Vista: Kernel for Fun and Profit", Black Hat Conference. http://blackhat. com/presentations/bh-usa-06/BH-US-06-Rutkowska. pdf (Accessed 30 April 2013)
  5. King, S. T. ; Chen, P. M. 2006, "SubVirt: implementing malware with virtual machines", IEEE Symposium on Security and Privacy, pp. 14-327. http://www. sciencedirect. com/science/article/pii/S1084804510001025
  6. Bahram, S. ; Xuxian Jiang; Zhi Wang; Grace, M. ; Jinku Li; Srinivasan, D. ; Junghwan Rhee; Dongyan Xu 2010. "DKSM: Subverting Virtual Machine Introspection for Fun and Profit", 29th IEEE Symposium on Reliable Distributed Systems, pp. 82-91.
  7. Mohammed H. Sqalli, Fahd Al-Haidari, Khaled Salah 2011. "EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing", Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 49-56.
  8. W. G. Morein, A. Stavrou, D. L. Cook, A. D. Keromytis, V. Misra, and D. Rubenstein 2003, "Using graphic Turing tests to counter automated DDoS attacks against web servers", In Proceedings of the 10th ACM conference on Computer and communications security, pp. 8-19.
  9. S Vivin Sandar, Sudhir Shenai 2012, "Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks", International Journal of Computer Applications (0975 – 8887), Vol. 41, No. 20, pp. 11-16.
  10. James C. Foster 2005, "IDS: Signature versus anomaly detection". http://searchsecurity. techtarget. com/tip/IDS-Signature-versus-anomaly-detection
  11. Roschke S. , Feng C. ,Meinel C. 2009, "Intrusion Detection in the Cloud", Eight IEEE international conference on Dependable, Autonomic and Secure Computing, pp. 729-734.
  12. Modi C, et al. 2012, "A survey of intrusion detection techniques in Cloud", Journal of Network and Computer Applications, http://dx. doi. org/10. 1016/j. jnca. 2012. 05. 003
  13. Debar, H. , Curry, D. , Feinstein, B. : The Intrusion Detection Message Exchange Format, Internet Draft Technical Report, IETF Intrusion Detection Exchange Format Working Group (July 2004).
  14. Lo CC, Huang CC, Ku J. 2008, "Cooperative Intrusion detection system framework for cloud computing networks", 39th IEEE International Conference on Parallel Processing Workshops, pp. 280-284.
  15. Bakshi A. ,Yogesh B. 2010, "Securing cloud from DDOS attacks using intrusion detection system in virtual machine", Second IEEE International conference on communication software and networks, pp. 260-264.
  16. Shelke, Ms Parag K. , Ms Sneha Sontakke, and A. D. Gawande 2012, "Intrusion Detection System for Cloud Computing", International Journal of Scientific & Technology Research Volume 1, Issue 4.
  17. Dotan Cohen 2007, "What is a Zero-Day Exploit?" http://what-is-what. com/what_is/zero_day_exploit. html (Accessed 29 April 2013)
  18. Mudzingwa, D. ; Agrawal, R. 2012, "A study of methodologies used in intrusion detection and prevention systems (IDPS)", Proceedings of IEEE Southeastcon, pp. 1-6.
  19. Karen Scarfone and Peter Mell 2007, "Guide to Intrusion Detection and Prevention Systems (IDPS)", Computer Security Division, Information Technology Laboratory NIST Gaithersburg. http://csrc. nist. gov/publications/nistpubs/800-94/SP800-94. pdf, (Accessed 29 April 2013)
  20. P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández, E. Vázquez 2009, "Anomaly-based network intrusion detection: Techniques, systems and challenges", Computers & Security, Vol. 28, Issues 1–2, Pages 18-28, ISSN 0167-4048, (http://www. sciencedirect. com/science/article/pii/S0167404808000692)
  21. Garfinkel T, Rosenblum M. 2003, "A Virtual Machine Introspection Based Architecture for Intrusion Detection", In Proc. Network and Distributed Systems Security Symposium 2003, pp. 191–206.
  22. Dastjerdi AV, Bakar KA, Tabatabaei SGH. 2009, "Distributed intrusion detection in clouds using mobile agents", Third international conference on advanced engineering computing and applications in sciences, pp. 175-180.
  23. Guan Y, Bao J. 2009, "A CP Intrusion detection strategy on cloud computing", Proceedings of the International Symposium on Web Information Systems and Applications (WISA'09) Nanchang, P. R. China, pp. 084-087.
  24. Moradi M, Zulkernine M. 2004, "A neural network based system for intrusion detection and classification of attacks", In Proceedings of the 2004 IEEE International conference on advances in intelligent systems—theory and Applications.
  25. Carlos Gershenson 2003, "Artificial Neural Networks for Beginners". http://arxiv. org/ftp/cs/papers/0308/0308031. pdf (Accessed 30 April 2013)
  26. Ibrahim LM. 2010, "Anomaly network intrusion detection system based on distributed time-delay neural network", Journal of Engineering Science and Technology, Vo. 5, Issue: 4, Start page: 457.
  27. Bashah, Idris Bharanidharan Shanmugam, Abdul Manan Ahmed 2005, "Hybrid Intelligent Intrusion Detection System", PROCEEDINGS OF WORLD ACADEMY Of Title SCIENCE, ENGINEERING AND TECHNOLOGY, Vol. 6. http://citeseerx. ist. psu. edu/viewdoc/summary?doi=10. 1. 1. 119. 8994
  28. Chi Cheng, Wee Peng Tay and Guang-Bin Huang 2012, "Extreme Learning Machines for Intrusion Detection", The 2012 International Joint Conference on Neural Networks (IJCNN), pp. 1-8.
  29. Roshan Chitrakar and Huang Chuanhe 2012, "Anomaly Detection using Support Vector Machine Classification with k-Medoids Clustering", Third Asian Himalayas International Conference on Internet (AH-ICI), pp. 1-5
  30. Noreen Kausar, BrahimBelhaouari Samir, SuziahBtSulaiman, Iftikhar Ahmad, Muhammad Hussain 2012, "An Approach towards Intrusion Detection using PCA Feature Subsets and SVM", International Conference on Computer & Information Science (ICCIS), PP. 569-574.
  31. Dickerson, J. E. , Dickerson, J. A. 2000, "Fuzzy network profiling for intrusion detection", 19th International Conference of the North American Fuzzy Information Processing Society, pp. 301-306.
  32. Dickerson, J. E. , Juslin, J. , Koukousoula, O. , Dickerson, J. A. 2001, "Fuzzy intrusion detection", IFSA World Congress and 20th NAFIPS International Conference, 2001. Joint 9th, pp. 1506-1510.
  33. Piyakul Tillapart, Thanachai Thumthawatworn and Pratit Santiprabhob 2002, "Fuzzy Intrusion Detection System", Proc. of 6th World Multiconference on Systemics, Cybernetics and Informatics, pp. 272-276.
  34. Chavan, S. , Shah, K. , Dave, N. , Mukherjee, S. , Abraham, A. , Sanyal, S. 2004, "Adaptive neuro-fuzzy intrusion detection systems", Proceedings of International Conference on Information Technology: Coding and Computing, pp. 70- 74.
  35. Botha M, Solms R, Perry K, Loubser E,Yamoyany G. 2002, " The utilization of artificial intelligence in a hybrid intrusion detection system", In Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, pp. 149-155.
  36. Naqshbandi, Susan M. Al; Samawi, Venus W. 2012, "One-rule Genetic-Fuzzy classifier", IEEE International Conference on Computer Science and Automation Engineering (CSAE), pp. 204-208.
  37. Hong Han; Xin-Liang Lu; Li-Yong Ren; 2004, "Using data mining to discover signatures in network-based intrusion detection", Proceedings of International Conference on Machine Learning and Cybernetics, pp. 13- 17.
  38. Yu-Xin Ding; Hai-Sen Wang; Qing-Wei Liu; 2008, "Intrusion scenarios detection based on data mining", International Conference on Machine Learning and Cybernetics, pp. 1293-1297.
  39. Hu Zhengbing; Li ZhiTang; Wu Junqi; 2008, "A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining", First International Workshop on Knowledge Discovery and Data Mining, pp. 10-16.
  40. Tian-rui Li; Wu-ming Pan; 2005, "Intrusion detection system based on new association rule mining model", IEEE International Conference on Granular Computing, pp. 512- 515.
  41. Lei Li; De-Zhang Yang; Fang-Cheng Shen; 2010, "A novel rule-based Intrusion Detection System using data mining", 3rd IEEE International Conference on Computer Science and Information Technology, pp. 169-172.
  42. Wei Li 2004, "Using Genetic Algorithm for Network Intrusion Detection", In Proceedings of the United States Department of Energy Cyber Security Group Training Conference, pp. 24-27.
  43. Xia, T. ; Qu, G. ; Hariri, S. ; Yousif, M. 2005, "An efficient network intrusion detection method based on information theory and genetic algorithm", 24th IEEE International Performance, Computing, and Communications Conference, pp. 11-17.
  44. WEI LU AND ISSA TRAORE 2004, "DETECTING NEW FORMS OF NETWORK INTRUSION USING GENETIC PROGRAMMING", International Journal on Computational Intelligence, Vol. 20, No. 3, pp. 475-494.
  45. Goyal Anup and Chetan Kumar. 2007, "GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System", not published, Electrical Engineering and Computer Science, Northwestern University, Evanston, IL. http://www. cs. northwestern. edu/~ago210/ganids/GANIDS. pdf (Accessed 30 April 2013)
  46. B. Abdullah, I. Abd-alghafar, Gouda I. Salama, A. Abd-alhafez 2009, "Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System", 13th International Conference on AEROSPACE SCIENCES & AVIATION TECHNOLOGY. http://www. mtc. edu. eg/asat13/pdf/CE14. pdf (Accessed 30 April 2013)
  47. B. Uppalaiah, K. Anand, B. Narsimha, S. Swaraj, T. Bharat 2012, "Genetic Algorithm Approach to Intrusion Detection System", International Journal of Computer Science and Technology, Vol. 3, Issue 1, pp. 156-160.
  48. Vieira, K. ; Schulter, A. ; Westphall, C. B. ; Westphall, C. M. 2010, "Intrusion Detection for Grid and Cloud Computing", IT Professional, vol. 12, no. 4, pp. 38-43.
  49. S. V. Narwane, S. L. Vaikol 2012, "Intrusion Detection System in Cloud Computing Environment", IJCA Proceedings on International Conference on Advances in Communication and Computing Technologies, ICACACT (2):9-17.
  50. http://maltainfosec. org/archives/26-The-concept-of-Intrusion-Detection-Systems. html, 2011
  51. Jun-Ho Lee; Min-Woo Park; Jung-Ho Eom; Tai-Myoung Chung 2011, "Multi-level Intrusion Detection System and log management in Cloud Computing", 13th International Conference on Advanced Communication Technology (ICACT), pp. 552-555.
  52. Bharadwaja, S. ; Weiqing Sun; Niamat, M. ; Fangyang Shen 2011, "Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System", Eighth International Conference on Information Technology: New Generations (ITNG), pp. 695-700.
  53. Turki Alharkan, Patrick Martin 2012, "IDSaaS: Intrusion Detection System as a Service in Public Clouds", 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 686 687.
  54. Nathan Einwechter, (updated 2010), "An Introduction to Distributed Intrusion Detection Systems" http://www. symantec. com/connect/articles/introduction-distributed-intrusion-detection-systems (Accessed 30 April 2013)
  55. Lo CC, Huang CC, Ku J. 2008, "Cooperative Intrusion detection system framework for cloud computing networks", 39th IEEE International Conference on Parallel Processing Workshops, pp. 280-284.
Index Terms

Computer Science
Information Sciences

Keywords

IDS Cloud Computing EDoS attack HIDS NIDS and Signature based IDS Anomaly based IDS Attacks on Cloud