CFP last date
20 January 2025
Reseach Article

Intrusion Detection by Forensic Method in Private Cloud using Eucalyptus

by Mayur S. Patil, Bharati Ainapure
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 12
Year of Publication: 2014
Authors: Mayur S. Patil, Bharati Ainapure
10.5120/14897-3373

Mayur S. Patil, Bharati Ainapure . Intrusion Detection by Forensic Method in Private Cloud using Eucalyptus. International Journal of Computer Applications. 85, 12 ( January 2014), 50-60. DOI=10.5120/14897-3373

@article{ 10.5120/14897-3373,
author = { Mayur S. Patil, Bharati Ainapure },
title = { Intrusion Detection by Forensic Method in Private Cloud using Eucalyptus },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 12 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 50-60 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number12/14897-3373/ },
doi = { 10.5120/14897-3373 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:02:18.803561+05:30
%A Mayur S. Patil
%A Bharati Ainapure
%T Intrusion Detection by Forensic Method in Private Cloud using Eucalyptus
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 12
%P 50-60
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has become the mature term which has dealt from single user to large enterprises. The private cloud platform building framework Eucalyptus has great pace of development within short span of time. Achieving AWS (Amazon Web Services) compatible features development along with scalability and sustainability has introduced several issues have an adverse effect on the cloud system. In continuing with this, the chances of intrusion also increase evading traditional mechanism of security. Issues have been introduced due to seamless integration of such structure with computing technologies and so on. By taking advantage of such flaws, the Cybercrime is rapidly increasing in this field. The proposed work is regarded with Digital forensics technique and intrusion detection mechanism. In this scope of work, an experimental setup of Eucalyptus with Snort NIDS (Network Intrusion Detection System) to detect attacks using snort rules has been created. The Eucalyptus Cloud components and Snort logs are exported to outside cloud network to rSyslog server which would be later analyzed by the Awstats log analyzer. Accompanied to above, this scope of work also addresses toward the issue of Eucalyptus to export its logs to the remote rSyslog server. This system will definitely help to reduce the strain on the Cloud forensics.

References
  1. Eucalyptus,http://www. eucalyptus. com/eucalyptus-cloud/iaas/features
  2. Github, https://github. com/eucalyptus/eucalyptus
  3. Adeela Waqar, Asad Raza, Haider Abbas, 2011, User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment" ,International Joint Conference of IEEE, Pg(s): 927-32.
  4. Zafarullah, Faiza Anwar, Zahid Anwar, 2011, "Digital Forensics For Eucalyptus",Frontiers of Information Technology, IEEE Computer Society, Pg. 110-16.
  5. Cloud Forensics: http://cloudtimes. org/2012/11/05/the-basics-of-cloud-forensics/
  6. Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, and Aiko Pras, 2012, "Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study"IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, Pg. 128-41
  7. Jiong Zhang, Mohammad Zulkernine, and Anwar Haque, 2008, "Random-Forests-Based Network Intrusion Detection Systems" IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, Pg. 649-59.
  8. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing,Jeongkeun Lee and Dijiang Huang, 2013, "NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems"IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Pg. 198-211
  9. Jun-Ho Lee,Min-Woo Park, Jung-Ho Eom and TaiMyoung Chung, 2011, "Multilevel Intrusion Detection System and Log Management in Cloud Computing", 13th International Conference on Advanced Communication Technology (ICACT), IEEE, Page(s): 552 - 555.
  10. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He,Priyadarsi Nanda and Ren Ping Liu , 2013, "A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Pg. 1-11.
  11. Hannes Holm, 2013, "A large-scale study of the time required to compromise a computer system" IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Pg. 1- 14
  12. Terrence V. Lillard, "Digital Forensics for Network, Internet, and Cloud Computing ", Syngress Publication Elsevier Inc.
  13. Denis Reilly, Chris Wren, Tom Berry, 2011, "Cloud Computing :Pros and Cons for Computer Forensic Investigations", International Journal Multimedia and Image Processing (IJMIP), Pg. 265 - 270.
  14. Hong Guo, Bo Jin, Ting Shang, 2012, "Forensic Investigations in Cloud Environments",IEEE International Conference on Computer Science and Information Processing(CSIP),Pg. 248 - 251.
  15. Stephen Biggs and Stilianos Vidalis, 2009, "Cloud Computing:The Impact on Digital Forensic Investigations",Copyright Institute of Electrical and Electronics Engineers, Inc, Pg. 1 - 6.
  16. Dominik Birk,Christoph Wegener, 2011, "Technical Issues of Forensic Investigations in Cloud Computing Environments",Systematic Approaches to Digital Forensic Engineering (SADFE), IEEE Conference Publications. Pg. 1 - 10
  17. George Sibiya,H. S. Venter,Sipho Ngobeni,Thomas Fogwill, 2012, "Guidelines for Procedures of a Harmonised Digital Forensic Process in Network Forensics",IEEE Conference on Information Security for South Africa (ISSA), Pg. 1-7.
  18. Luís Filipe da Cruz Nassif and Eduardo Raul Hruschka,2013,"Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection",IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, Pg. 46-54
  19. Hyun Jin Kim, Hong-Sik Kim, and Sungho Kang, 2011, "A Memory-Efficient Bit-Split Parallel String Matching Using Pattern Dividing for Intrusion Detection Systems", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Pg. 1904-11
  20. Meixing Le, Angelos Stavrou and Brent ByungHoon Kang, 2012," DoubleGuard: Detecting Intrusions in Multitier Web Applications",IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Pg. 512-25
  21. Gideon Creech and Jiankun Hu,2013, "A Semantic Approach to Host-based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns" IEEE TRANSACTIONS ON COMPUTERS, Pg. 1-14
  22. Francisco Maciá-Pérez, Francisco J. Mora-Gimeno, Diego Marcos-Jorquera, Juan Antonio Gil-Martínez-Abarca, Héctor Ramos-Morillo, and Iren Lorenzo-Fonseca, 2011,"Network Intrusion Detection System Embedded on a Smart Sensor" IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, Pg. 722-32
  23. Mohsen Damshenas,Ali Dehghantanha,Ramlan Mahmoud, Solahuddin bin Shamsuddin, 2012,"Forensics Investigation Challenges in Cloud Computing Environments", 978-1-4672-1677-4,Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), International Conference IEEE Conference Publications, Pg. 190 - 194.
  24. Brian Hay, Kara Nance, Matt Bishop, 2011,"Storms Clouds Rising: Security Challenges for IaaS Cloud Computing" ,Proceedings of the 44th Hawaii International Conference on System Sciences, Pg. 1-6.
  25. Stephen D. Wolthusen, 2009, "Overcast: Forensic Discovery in Cloud Environments", Fifth International Conference on IT Security Incident Management and IT Forensics, IEEE, Pg. 3-9.
  26. John Sammons,"The Basics of Digital Forensics:The Primer for Getting Started in Digital Forensics", Syngress Inc Elsevier Pub.
  27. Hping, https://en. wikipedia. org/wiki/Hping
  28. Wesley M. Eddy, Verizon Federal Network Systems, 2006, "Defenses Against TCP SYN Flooding Attacks", The Internet Protocol Journal - Volume 9, Number 4, December.
  29. SSL DoS, http://www. thc. org/thc-ssl-dos
Index Terms

Computer Science
Information Sciences

Keywords

Eucalyptus Cloud Forensics IDS Snort Logs Awstats log analyzer.