CFP last date
20 May 2024
Reseach Article

Host-based Implementation of NICE-A in Cloud Computing's Virtual Network

by Amit Patel, Alekh Dwivedi, Vineet Richariya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 1
Year of Publication: 2015
Authors: Amit Patel, Alekh Dwivedi, Vineet Richariya
10.5120/20712-3031

Amit Patel, Alekh Dwivedi, Vineet Richariya . Host-based Implementation of NICE-A in Cloud Computing's Virtual Network. International Journal of Computer Applications. 118, 1 ( May 2015), 29-35. DOI=10.5120/20712-3031

@article{ 10.5120/20712-3031,
author = { Amit Patel, Alekh Dwivedi, Vineet Richariya },
title = { Host-based Implementation of NICE-A in Cloud Computing's Virtual Network },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 1 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 29-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number1/20712-3031/ },
doi = { 10.5120/20712-3031 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:31.881971+05:30
%A Amit Patel
%A Alekh Dwivedi
%A Vineet Richariya
%T Host-based Implementation of NICE-A in Cloud Computing's Virtual Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 1
%P 29-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To ride the tide of change which is inevitable, innovations are necessary. By using the concept of virtualization most of enterprises are trying to reduce their computing cost. This demand of reducing the computing cost has led to the innovation of Cloud Computing. Nowadays organizations recognized cloud for it different attractive property such as economically attractive and use it to host their services. So that their services available easily and economically to their users. But also many organization put security in their top concern before adopting the cloud service. One of the most significant problem that associated with cloud computing is cloud security that drawn a lot of analysis and research within past few years. Inside the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the actual prognosis associated with zombie exploration problems is exceedingly hard. This is because cloud users might deploy somewhat insecure purposes on the exclusive products. NICE is a Network Intrusion detection and Countermeasure selection in virtual network systems (NICE) design to establish an intrusion detection framework which is defense-in-depth in nature. Into the intrusion detection processes an attack graph analytical procedures is incorporated by NICE for better attack detection. In this paper we proposed to implement NICE-A as a host based agent instead network based so the data delivery time between sender and intended destination is saved as NICE-A is implemented in destination (which is cloud server in our case) and for large amount of data this definitely shows improvement in computation time. Moreover as NICE-A is implemented as host based so CPU utilization is also improved.

References
  1. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, "Above the Clouds: A Berkeley View of Cloud Computing" Technical Report No. UCB/EECS-2009-28.
  2. Sean Marston, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhang, Anand Ghalsasi, "Cloud computing —The business perspective" Elsevier, Decision Support Systems 51 (2011), pp. 176-189
  3. Peter Mell, Timothy Grance "The NIST Definition of Cloud Computing" NIST Special Publication 800-145 Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  4. Ajay Jangra, Renu Bala ?Spectrum of Cloud Computing Architecture: Adoption and Avoidance Issues, International Journal of Computing and Business Research, Volume 2, Issue 2, May 2011.
  5. Smith Jones "effective algorithmic approach for cloud security based on hash cryptography" international journal of enterprise computing and business services Volume 4 Issue 1 January - July 2014.
  6. Fernando C. Colon Osorio, Ferenc Leitold, "Measuring the effectiveness of modern security products to detect and contain emerging threats – a consensus-based approach", IEEE, pp. 27-34, 2013.
  7. BaoRong Chang, Chi-Ming Chenand, Hsiu-Fen Tsai, "Evaluation of Virtual Machine Performance and Virtualized Consolidation Ratio in Cloud Computing System", Journal of Information Hiding and Multimedia Signal Processing Ubiquitous International, Volume 4, Number 3, pp. 192-300, July 2013.
  8. Cloud security alliance The Notorious Nine: Cloud Computing Top Threats in 2013, pp. 1-21, February 2013.
  9. Raju M, Lanitha B, "Survey about Cloud Computing Threats" (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1), 2014, pp. 384-389.
  10. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee and Dijiang Huang "NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", IEEE Transactions on Dependable and Secure Computing, VOL. 10, NO. 4, pp. 198-51, July/August 2013.
  11. Claudio Mazzariello, Roberto Bifulco and Roberto Canonico, "Integrating a Network IDS into an Open Source Cloud Computing Environment" Sixth international conference of Information Assurance and security Aug 23-25. Page(s):265 – 270, 2010.
  12. Ang Li, Lin Gu and Kuai Xu "Fast Anomaly Detection for Large Data Centers", in Global Telecommunications Conference (GLOBECOM 2010), IEEE Miami, FL December 6-10, pp. 1–6, 2010.
  13. Amir Houmansadr, Saman A. Zonouz, and Robin Berthier, "A Cloud-based Intrusion Detection and Response System for Mobile Phones", in IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, Jun 27-30, pp. 31-32, 2011.
  14. Gustavo Nascimento, Miguel Correia, "Anomaly-based Intrusion Detection in Software as a Service" Detection and Response System for Mobile Phones", in IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, Jun 27-30, pp. 19-24, 2011.
  15. Cristina Basescu, Catalin Leordeanu, Alexandru Costan, "Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies", in IEEE International Conference on Advanced Information Networking and Applications (AINA), Biopolis, March 22-25, pp. 459-456, 2011.
  16. Chih-Hung Lin, Chin-Wei Tien, Hsing-Kuo Pao, "Efficient and Effective NIDS for Cloud Virtualization Environment", IEEE 4th International Conference on Cloud Computing Technology and Science, pp. 250-254, 2012.
  17. Bhushan Lal Sahu and Rajesh Tiwari, "A Comprehensive Study on Cloud Computing", IJARCSSE, Volume 2, Issue 9, pp. 33-37, September 2012.
  18. Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed and Fabrizio Baiardi, "HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems", Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 179-184, 2013.
  19. Chun-Jen Chung, JingSong Cui, Pankaj Khatkar and Dijiang Huang, "Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations", 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Work sharing, pp. 5-30, (Collaborative Com 2013).
  20. Rohit S. Khune, J. Thangakumar, "A Cloud-Based Intrusion Detection System for Android Smartphones", 2012 International Conference on Radar, Communication and Computing (ICRCC), SKP Engineering College, Tiruvannamalai, TN. , India, pp. 180-184, 21 - 22 December, 2012.
  21. Jain Pratik P1, Madhu B. R. , "Data Mining based CIDS: Cloud Intrusion Detection System for Masquerade Attacks [DCIDSM]", 4th ICCCNT 2013 July 4-6, 2013, Tiruchengode, India, IEEE - 31661.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing virtualization Intrusion Detection cloud security NICE NICE-A