CFP last date
20 May 2024
Reseach Article

Managing Intrusion Detection as a Service in Cloud Networks

by Hatem Hamad, Mahmoud Al-hoby
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 1
Year of Publication: 2012
Authors: Hatem Hamad, Mahmoud Al-hoby
10.5120/5508-7533

Hatem Hamad, Mahmoud Al-hoby . Managing Intrusion Detection as a Service in Cloud Networks. International Journal of Computer Applications. 41, 1 ( March 2012), 35-40. DOI=10.5120/5508-7533

@article{ 10.5120/5508-7533,
author = { Hatem Hamad, Mahmoud Al-hoby },
title = { Managing Intrusion Detection as a Service in Cloud Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 1 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number1/5508-7533/ },
doi = { 10.5120/5508-7533 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:28:31.125910+05:30
%A Hatem Hamad
%A Mahmoud Al-hoby
%T Managing Intrusion Detection as a Service in Cloud Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 1
%P 35-40
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is frequently being utilized to eliminate the need to local information resources. In this paper, we address the problem of intrusion detection in cloud environments and the possibility of allowing intrusion detection to be provided to clients as a service. The paper describes the Cloud Intrusion Detection Service (CIDS), which is intended to function as an intrusion detection web service to be provided for cloud clients in a service-based manner. CIDS utilizes the "Snort" open source intrusion detection system. The operating logic and user access webpages were developed using J2EE. We implemented a proof-of-concept prototype to evaluate the performance. CIDS was proved to be very friendly to resource allocation. Additionally, CIDS gave better attack detection rates and attack detection times than other solutions. These improvements can be beneficial to both cloud providers and cloud subscribers alike.

References
  1. I. Foster, Yong Zhao, I. Raicu, and S. Lu, "Cloud Comuting and Grid Computing 360-Degree Compared," in Grid Computing Environments Workshop, Austin, Texas, 2008, pp. 1 - 10.
  2. F. Liu, W. Guo, Z. Q. Zhao, and W. Chou, "SaaS Integration for Software Cloud," in IEEE 3rd International Conference on Cloud Computing, Miami, FL, 2010, p. 402.
  3. McAfee Security. Security as a Service. [Online]. http://www. mcafee. com/us/small/security_insights/security_as_a_service. html
  4. HackerTarget. com. (2008, April) Security from the Cloud: Remote Vulnerability Scanning. Whitepaper.
  5. K. Balakrishnan, S. Roy, and M. Holt. (2009, April) Email and Web Security SaaS. Whitepaper.
  6. Panda Security. (2009) Switching from Anti-Virus to Security as a Service (SaaS). Whitepaper.
  7. A. V. Dastjerdi, K. Abu Bakar, and S. Tabatabaei, "Distributed Intrusion Detection in Clouds Using Mobile Agents," in Third International Conference on Advanced Engineering Computing and Applications in Sciences, 2009, pp. 175-180.
  8. P. Kannadiga and M. Zulkernine, "Distributed Intrusion Detection System Using Mobile Agents," in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005.
  9. A. Bakshi and Yogesh B, "Securing cloud from DDOS Attacks using Intrusion Detection System in Virtual Machine," in Second International Conference on Communication Software and Networks, Singapore, 2010, pp. 260-264.
  10. C. Mazzariello, R. Bifulco, and R. Canonico, "Integrating a Network IDS into an Open Source Cloud Computing Environment," in Sixth International Conference on Information Assurance and Security, Atlanta, 2010, pp. 265-270.
  11. Ch. Lo, Ch. Huang, and J. Ku, "A Cooperative Intrusion Detection System Framework for Cloud Computing Networks," in 39th International Conference on Parallel Processing Workshops, 2010, pp. 280-284.
  12. Wikipedia. Denial-of-service attack. [Online]. http://en. wikipedia. org/wiki/Denial-of-service_attack
  13. D. J. Ragsdale, C. A. Carver, Jr. J. W. Humphries, and U. W. Pooch, "Adaptation Techniques for Intrusion Detection and Intrusion Response Systems," Computer Networks, vol. 4, pp. 2344-2349.
  14. E. H. Spafford and D. Zamboni, "Intrusion Detection Using Autonomous Agent," Computer Networks, vol. 34, no. 4, pp. 547-570, 2000.
  15. S. Roschke, F. Cheng, and Ch. Meinel, "Intrusion Detection in the Cloud," in Eighth IEEE International Conference on Dependable, Autonomic, and Secure Computing, 2009, pp. 729-734.
  16. M. Laureano, C. Maziero, and E. Jamhour, "Protecting Hostbased Intrusion Detectors through Virtual Machines," International Journal of Computer and Telecommunications Networking, vol. 51, no. 5, pp. 1275-1283, April 2007.
  17. Y. Weinsberg, S. Tzur-David, D. Dolev, and T. Anker, "High performance string matching algorithm for a network intrusion prevention system (NIPS)," in High Performance Switching and Routing, Poznan, 2006, p. 7 pp.
  18. Oracle America. Oracle Corp. [Online]. http://www. oracle. com/technetwork/java/javaee/overview/index. html
  19. Sun Microsystems. Sun Developer Network (SDN)). [Online]. http://java. sun. com/products/jsp/
  20. Canonical Ltd. Ubuntu Linux. [Online]. http://www. ubuntu. com/
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cre Intrusion Detection Saas