CFP last date
20 December 2024
Reseach Article

Intrusion Detection System in Cloud Computing Environment

Published on August 2012 by S. V. Narwane, S. L. Vaikole
International Conference on Advances in Communication and Computing Technologies 2012
Foundation of Computer Science USA
ICACACT - Number 2
August 2012
Authors: S. V. Narwane, S. L. Vaikole
c21408ea-f1fd-48db-b6b9-25a9a0364708

S. V. Narwane, S. L. Vaikole . Intrusion Detection System in Cloud Computing Environment. International Conference on Advances in Communication and Computing Technologies 2012. ICACACT, 2 (August 2012), 9-17.

@article{
author = { S. V. Narwane, S. L. Vaikole },
title = { Intrusion Detection System in Cloud Computing Environment },
journal = { International Conference on Advances in Communication and Computing Technologies 2012 },
issue_date = { August 2012 },
volume = { ICACACT },
number = { 2 },
month = { August },
year = { 2012 },
issn = 0975-8887,
pages = { 9-17 },
numpages = 9,
url = { /proceedings/icacact/number2/7974-1010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Communication and Computing Technologies 2012
%A S. V. Narwane
%A S. L. Vaikole
%T Intrusion Detection System in Cloud Computing Environment
%J International Conference on Advances in Communication and Computing Technologies 2012
%@ 0975-8887
%V ICACACT
%N 2
%P 9-17
%D 2012
%I International Journal of Computer Applications
Abstract

The Cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders[1]. There are various Intrusion Detection Systems having various specifications to each. Cloud computing have two approaches i. e. Knowledge-based IDS and Behavior-Based IDS to detect intrusions in cloud computing. Behavior-Based IDS assumes that an intrusion can be detected by observing a deviation from normal to expected behavior of the system or user[2]s. Knowledge-based IDS techniques apply knowledge accumulated about specific attack . Knowledge-based IDS can't detect unknown attacks, but it uses rules and monitors a stream of event s to find malicious characteristics and set the new rules for unknown attacks. In this paper we proposed a system is to detect intrusions in the cloud computing using Behavior-based approach and knowledge-based approach. If first approach unable to detect the data, second approach again verifies the data and compare it with the signatures within the database. In the proposed system definitely we will have very low false positive alarm.

References
  1. Kleber Vieira, Alexander Schulter,CarlosBecker Westphall, and Carla Merkle Westphall "Intrusion Detection for Grid and Cloud Computing" (IT Professionals, Vol. 12, no. 4, 2010 pp 38-43 )
  2. S N Dhage, B B Meshram, R Rwat, S Pawawe, M Paingaonkar, A Misra "Intrusion Detection System in Cloud Computing Environment," International Conf. And Workshop on Emerging Trends in Technology" (ICWET 2011, ACM Press, pp. 235-239).
  3. Farzad Sabahi "Cloud Computing Security Threats and Responses" ( IEEE Press (2011), pp. 245-249).
  4. Michael R. Hines "Going Beyond Behavior-Based Intrusion Detection" ( IEEE Press 2011)
  5. Kazi Zunnurhain, Susan Vrbsky "Security Attacks and Solutions in Cloud"
  6. Wikipedia. http://www. wikipdea. com.
  7. Book- Matt Bishop "Computer Security"
Index Terms

Computer Science
Information Sciences

Keywords

Behavior –based Intrusion Detection Cloud Computing Intrusion Detection System (ids) Knowledge-based Intrusion Detection Eucalyptus