CFP last date
20 May 2024
Reseach Article

Article:Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure

by Afshin Rezakhani Roozbahani, Leila Rikhtechi, Nasibe Mohammadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 4
Year of Publication: 2010
Authors: Afshin Rezakhani Roozbahani, Leila Rikhtechi, Nasibe Mohammadi
10.5120/760-962

Afshin Rezakhani Roozbahani, Leila Rikhtechi, Nasibe Mohammadi . Article:Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure. International Journal of Computer Applications. 3, 4 ( June 2010), 41-45. DOI=10.5120/760-962

@article{ 10.5120/760-962,
author = { Afshin Rezakhani Roozbahani, Leila Rikhtechi, Nasibe Mohammadi },
title = { Article:Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 4 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number4/760-962/ },
doi = { 10.5120/760-962 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:05.091946+05:30
%A Afshin Rezakhani Roozbahani
%A Leila Rikhtechi
%A Nasibe Mohammadi
%T Article:Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 4
%P 41-45
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays security has an important role in communications. The major weakness in detection/prevention systems is that the power of them is restricted only to the network on which algorithms are applied. This paper presents a new method to solve the problem of their localities. We propose place snorts with the capability to convert detected attacks properties to semantic web forms (SWFs) in several verified servers in cloud computing infrastructure. The major advantage of this approach is that all intrusion detection/prevention systems in world can use SWFs to detect/prevent any attack well. We will evaluate this method and show that the resulted traffic is balanced by the time.

References
  1. A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with Jayshree Ullal, senior VP of Cisco
  2. Dave Dittrich, “Network monitoring/Intrusion Detection Systems (IDS)”, University of Washington.
  3. Kevin Law, “An Introduction of Firewall: Architectures and Functions”, SE 4C03 Computer Networks and Computer Security, 2005.
  4. Steven E Smaha. Haystack: An Intrusion Detection System. In Fourth Aerospace Computer Security Applications Conference, pages 37-44, Tracor Applied Science Inc., Austin, Texas, December 1988.
  5. http://www.honeypots.net/
  6. http://www.snort.org/
  7. Sun microsystems, "Introduction to Cloud Computing architecture" White Paper 1st Edition, June 2009.
  8. Berners-Lee, Tim, James Hendler and Ora Lassila, "The Semantic Web", Scientific American Magazine, Retrieved March 26, 2008.
  9. http://www.w3.org/2001/sw/SW-FAQ. Retrieved March 13, 2008.
  10. Jeffrey Undercoffer, Anupam Joshi, and John Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", Springer, LNCS 2820, pp. 113–135, 2003.
  11. Afshin Rezakhani Roozbahani, Ramin Nassiri and GolamReza Latif-Shabgahi, "Service Oriented Approach to Improve the Power of Snorts", ICCEE 2009, UAE, December 2009.
  12. R.L.Rivest, A.Shamir and L.Adleman "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM 21 (2): 120–126, 1978.
  13. URL:http://www.networkworld.com/news/2008/090908-japan-attacktraffic.html, Last visited in March 2010.
  14. S.A.Thorat, A.K.Khandelwal, B.Bruhadeshwar and K.Kishore, ”Payload Content based Network Anomaly Detection”, Centre for Security Theory and Algorithmic Research (CSTAR) IIIT-Hyderabad, India, 2007.
  15. Joachim H. Ahrens and Ulrich Dieter, "Computer Methods for Sampling from Gamma, Beta, Poisson and Binomial Distributions", Computing 12 (3) 223–246, 1974.
  16. Shun, J. Malki, H.A., "Network Intrusion Detection System Using Neural Networks", ICNC 08, Jinan , November 2008.
  17. S.A.Onashoga, Adebayo D.Akinde and A. S.Sodiya, “A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems” Department of Computer Science, University of Agriculture,Abeokuta, Nigeria, Volume 6, 2009.
  18. http://www.seattlerobotics.org/Encoder/mar98/fuz/flindex.html, Last visited in March 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Snort Semantic Web Servers