Open Access   Article Go Back

Proposing Cloud Based Intrusion Detection System for Tracing Intruder Attacks

A.K. Chaturvedi1 , F.A. Lone2

  1. Deptt, Govt. Engineering College, Ajmer, India.
  2. CS Dept., Mewar University, Chittorgarh, Rajasthan, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-4 , Page no. 97-104, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i4.97104

Online published on Apr 30, 2018

Copyright © A.K. Chaturvedi, F.A. Lone . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.K. Chaturvedi, F.A. Lone, “Proposing Cloud Based Intrusion Detection System for Tracing Intruder Attacks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.97-104, 2018.

MLA Style Citation: A.K. Chaturvedi, F.A. Lone "Proposing Cloud Based Intrusion Detection System for Tracing Intruder Attacks." International Journal of Computer Sciences and Engineering 6.4 (2018): 97-104.

APA Style Citation: A.K. Chaturvedi, F.A. Lone, (2018). Proposing Cloud Based Intrusion Detection System for Tracing Intruder Attacks. International Journal of Computer Sciences and Engineering, 6(4), 97-104.

BibTex Style Citation:
@article{Chaturvedi_2018,
author = {A.K. Chaturvedi, F.A. Lone},
title = {Proposing Cloud Based Intrusion Detection System for Tracing Intruder Attacks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {4},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {97-104},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1852},
doi = {https://doi.org/10.26438/ijcse/v6i4.97104}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.97104}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1852
TI - Proposing Cloud Based Intrusion Detection System for Tracing Intruder Attacks
T2 - International Journal of Computer Sciences and Engineering
AU - A.K. Chaturvedi, F.A. Lone
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 97-104
IS - 4
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
566 397 downloads 185 downloads
  
  
           

Abstract

Before proposing a new model and implementing it in the Intrusion Detection Systems, First find out how intrusion detection is performed on Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) offerings, along with the available host, network and hypervisor-based intrusion detection options. The ability to perform intrusion detection in the cloud is heavily dependent on the model of cloud computing. In cloud computing, most of the attacks till today traced are the remote attacks. In this paper, we are proposing a model for Cloud Based Intruder Detection System [CBIDS]. This model is created for tracing the attacks on the online storage at SaaS and PaaS layer of cloud computing and appropriately the recommended action will be taken to protect the stored data and executing the handler accordingly. Further modifications in this model will be done on the basis of obtaining requirements and gaps in tracing the attacks.

Key-Words / Index Term

Cloud, Intruder, IDS, Intrusion Detection System, HIDS, NIDS, Attack.

References

[1] S 1. S. Akter, S.F.Wamba, A. Gunasekaran , R. Dubey, S. J.Childe, “How to improve firm performance using big data analytics capability and business strategy alignment?”, Elsevier, Int. J. Production Economics 182 (2016), pp.113–131
[2] 2. C. Saadi, H. Chaoui, “Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb”, International Conference on Computational Modeling and Security (CMS 2016), pp.433-442
[3] 3. Costa DG, Guedes LA (2011) “Exploiting the sensing relevancies of source nodes for optimizations invisual sensor networks.” Multimed Tools Appl 55, 2003.
[4] 4. Grance, T., Mell, P.: The nist definition of cloud computing. National Institute of Standards & Technology (NIST) (2009), http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
[5] 5. Roschke, S., Cheng, F., Meinel, C.: Intrusion detection in the cloud. In: IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp.729-734, 2009.
[6] 6. Ramya. R Securing the system using honeypot in cloud computing environment International Journal of Multidisciplinary Research and Development Volume: 2, Issue: 4, 172-176April 2015.
[7] 7. Y. Sun, Y. Luo, and all, Fast live cloning of virtual machine based on xen. In High Performance Computing and Communications HPCC ’09, 11th IEEE International Conference on pages 392-399, June 2009.
[8] 8. U. Sivarajah, M. M. Kamal, Z. Irani, V. Weerakkody, “Critical analysis of Big Data challenges and analytical methods”, Journal of Business Research (2016), pp. 1-24
[9] 9. Z. Tan, X. He, P. Nanda, J. Hu “Enhancing Big Data Security with Collaborative Intrusion Detection”, Article in IEEE Cloud Computing (2014) • January 2015, pp. 34-40.
[10] 10. Neha, Mandeep Kaur, “Enhanced Security using Hybrid Encryption Algorithm”, IJIRCCE, ISSN(Online): 2320-9801, Vol. 4, Issue 7, July 2016
[11] 11. A. Kaur, S. Singh, “An Efficient data storage security algorithm using RSA Algorithm”, IJAIEM, Volume 2, Issue 3, March 2013, ISSN 2319 – 4847, pp. 536-540.
[12] 12. A. Bhardwaj, GVB Subrahmanyam, V. Avasthi, H. Sastry, “Security Algorithms for Cloud Computing”, International Conference on Computational Modeling and Security (CMS 2016), Elsevier, Procedia Computer Science 85 ( 2016 ), pp. 535 – 542
[13] 13. J. Khan, H. Abbasa, J. Al-Muhtadia, “Survey on Mobile User`s Data Privacy Threats and Defense Mechanisms”, International Workshop on Cyber Security and Digital Investigation (CSDI 2015), Elsevier, Procedia Computer Science 56 ( 2015 ), pp. 376 – 383
[14] 14. Al Haddad Zayed, H. Mostafa, M. Abdelaziz, B.Youness, “Hybrid Intrusion Detection Systems (HIDS) in Cloud Computing: Challenges and Opportunities”, IJEECSE, Volume 3, Issue 3 (June, 2016) | E-ISSN : 2348-2273, pp. 7-13
[15] 15. Shuying Li, Ya Pan, “Study on secure data storage based on cloud computing”, Bio Technology - An Indian Journal, BTAIJ, vol. 10, Issue 22, 2014 , ISSN : 0974 – 7435, pp. 13778-13783
[16] 16. U. Oktay, O. K. Sahingoz, “Proxy Network Intrusion Detection System for Cloud Computing”, ISBN: 978-1-4673-5613-8, 2013, IEEE, pp. 98-104.
[17] 17. Oktay and O.K. Sahingoz, “Attack Types and Intrusion Detection Systems in Cloud Computing”, 6th international information security & cryptology conference, Sep 2013, pp 71-76
[18] 18. C. Ambikavathi and S. K. Srivatsa, “Integrated Intrusion Detection Approach for Cloud Computing”, Indian Journal of Science and Technology, Vol 9(22), DOI: 10.17485/ijst/2016/v9i22/95170, June 2016, ISSN (Online) : 0974-5645.
[19] 19. Akash G Mohod, Satish J Alaspurkar, “Analysis of IDS for Cloud Computing”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 3, March 2013 ISSN 2319 – 4847.
[20] 20. S.N. Dhage, B.B. Meshram, “Intrusion detection system in cloud computing environment”, Int. J. Cloud Computing, Vol. 1, Nos. 2/3, 2012, pp. 261-282.
[21] 21. T. Kuldeep, Tyagi S.S and Agrawal R., Overview - Snort Intrusion Detection System in Cloud Environment, International Journal of Information and Computation Technology, ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334