CFP last date
20 January 2025
Reseach Article

Multi-agent Intrusion Detection and Prevention System for Cloud Environment

by K. Venkataramana, M. Padmavathamma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 20
Year of Publication: 2012
Authors: K. Venkataramana, M. Padmavathamma
10.5120/7888-1225

K. Venkataramana, M. Padmavathamma . Multi-agent Intrusion Detection and Prevention System for Cloud Environment. International Journal of Computer Applications. 49, 20 ( July 2012), 24-29. DOI=10.5120/7888-1225

@article{ 10.5120/7888-1225,
author = { K. Venkataramana, M. Padmavathamma },
title = { Multi-agent Intrusion Detection and Prevention System for Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 20 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number20/7888-1225/ },
doi = { 10.5120/7888-1225 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:44.687899+05:30
%A K. Venkataramana
%A M. Padmavathamma
%T Multi-agent Intrusion Detection and Prevention System for Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 20
%P 24-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a type of distributed computing approach for IT Sector that leverages in efficient pooling of on-demand, self-managed virtual Infrastructures consuming them as a service by applications/organizations which would save thousands of dollars on CapEx and OpEx. To adopt this new cloud technology main concern for the consumers is the cloud computing security and it is the responsibility for the service providers to secure the cloud make it available at all time without interruption. In cloud computing all resources are virtualized by Hypervisor by creating Virtual machines, but its vulnerabilities raises many questions relating to security due to intrusion of malwares which allows security breaches. In this paper we propose Multi-Agent Intrusion Detection and Prevention System(MA-IDPS) by using Agents which will prevent security breach in Cloud due to attacks from intruder malware programs. Our system will be deployed at every instance of VM as well as at the client node end to detect and prevent intrusions due to malicious programs by an IDPS agents. This MA-IDPS model not only protects the cloud environment but also secures its agents and encrypts data tables that are part of IDPS by placing them in secure environment like Agent Runtime Environment (ARE) and Root VM respectively. MA-IDPS agent reports or prevents any abnormal behavior to Cloud administrator for further action. The proposed model secures the cloud from outside attacks either from client side or by a malware programs created in VM's

References
  1. Karen Scarfone and Peter Mell, 800-94, Feb. 2007 "Guide to Intrusion Detection and Prevention Systems (IDPS)",National Institute of Standards and Technology(NIST),Special Publication.
  2. M. Wooldridge, 2009 , "An Introduction to Multi- Agent Systems", second ed. , JohnWiley & Sons Ltd,Chichester, England
  3. Kwang Mong Sim Senior Member, p78-81,March/ April 2012,"Agent-Based Cloud Computing, IEEE Computing", IEEE Transactions On Services Computing,2011
  4. Domenico Talia, "Clouds Meet Agents",2012 IEEE Internet Computing
  5. XueJing,Zhang Jian-jun, P 475-478,2010,"A Brief Survey on the Security model of cloud Computing, International symposium on Distributed computing and applications to business IEEE computer society
  6. Grobauer. B Walloschek. T. Stocker. E,2011,"understanding Cloud Computing Vulnerabilities",Security & Privacy, Volume:9 Issue:2,IEEE
  7. F. Rocha,M. Correia,2011,Lucy in the sky without diamonds: Stealing confidential data in the cloud.
  8. Anup ghosh, Chrish greamo, page 79-82, 2011, "Sandboxing and Virtualization", Security and privacy,IEEE.
  9. Islam M. Hegazy, Taha Al-Arif, Zaki. ,T. Fayed, and Hossam M. Faheem ,Oct-Nov 2003,"Multi-agent based system for intrusion Detection" ,Conference Proceedings of ISDA03, IEEE.
  10. Hisham A. Kholidy, Fabrizio Baiardi, 2012 CIDS: "A Framework for Intrusion and Detection in cloud Systems", 9th International Conference on Inform- ation Technology- New Generations,IEEE.
  11. Frank Doelitzscher?, Christoph Reich?, Martin Knahl and Nathan Clarke, p197-204, 2011,"An autonomous agent based incident detection system for cloud environments", 3rd IEEE International Conference on Cloud Computing Technology and Science
  12. H. Debar,D. Curry, 2007, Network Working Group Secure Works, Inc. http://www. ietf. org/rfc/rfc4765. txt
  13. Feng Du, 2012, "An Effective pattern matching algorithm for Intrusion Detection", International conference on Computer sciences and Electronic Engineering, IEEE.
  14. Dipankar Dasgupta and Hal Brian, "Mobile Security Agents for Network Traffic Analysis", Intelligent Security Systems Research Group
  15. D. Saha and A. Mukherjee, 2003 "Pervasive Computing: A Paradigm for the 21st Century Computer, vol. 36, pp. 25-31 [I6] Grossberg, S. , ed. ,1988 Neural Networks and Natural Intelligence, MIT Press, Cambridge, Massachusetts.
  16. Zadeh, L. ,1994 Fuzzy Logic, Neural Networks and Soft Computing, Communications of the ACM, Vol. 37, No. 3, pp. 77-84, 1994.
  17. Brendon Baker ,"Windows Server Virtualization & The windows Hypervisor", http://www. blackhat. com/presentations/bh-usa- 07/Baker/Presentation/BH07_Baker_WSV_ Hypervisor_Achitecture. pdf
  18. Microsoft Hyper-V Architecture, referred at http://en. wikipedia. org/wiki/Hyper-V
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Agents cloud computing Hypervisor Modified BM algorithm DLP Smart Agent User behavior