CFP last date
20 May 2024
Reseach Article

Rules based Enhancement in Cloud Intrusion Detection System Service

by Shalini Garg, Karanvir Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 19
Year of Publication: 2013
Authors: Shalini Garg, Karanvir Kaur
10.5120/12650-9177

Shalini Garg, Karanvir Kaur . Rules based Enhancement in Cloud Intrusion Detection System Service. International Journal of Computer Applications. 72, 19 ( June 2013), 24-27. DOI=10.5120/12650-9177

@article{ 10.5120/12650-9177,
author = { Shalini Garg, Karanvir Kaur },
title = { Rules based Enhancement in Cloud Intrusion Detection System Service },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 19 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number19/12650-9177/ },
doi = { 10.5120/12650-9177 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:38:20.525398+05:30
%A Shalini Garg
%A Karanvir Kaur
%T Rules based Enhancement in Cloud Intrusion Detection System Service
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 19
%P 24-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In cloud environment, chances of intrusion are more with cultivation of intruder's attacks because cloud computing is internet based computing where virtual servers provide software, Platform, Infrastructure or other computing resources to customer on pay-as-you-basis. With increment in need of computing services of cloud computing, demand of security as a service is also increasing with risks of vulnerabilities in cloud computing environment. Every cloud user wants to secure his/her resources which are shared by all users in cloud computing. In this paper cloud intrusion detection system service model is introduced which is based upon rules of CRG. The main purpose of this proposed model is to eliminate single point of failure vulnerability of IDS system in cloud computing by introducing concept of multiple IDSs so that if one IDS is compromised then other IDSs can be available for cloud users.

References
  1. Hoque Mohammad Sazzadul, Mukit Md. Abdul and Bikas Md. Abu Naser (2012) "An Implementation of Intrusion Detection System Using Genetic Algorithm" International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No 2, March 2012
  2. Zarrabi Amirreza, Zarrabi Alireza (2012) "Internet Intrusion Detection System Service in a Cloud" InternationalJournal of Computer Science Issues Vol. 9, No 2, September, 2012.
  3. Wang Shenghui, Shenzhen (2011) "Research of Intrusion Detection Based on an Improved K-means Algorithm "Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011.
  4. Ram M Sanjay, Vijayaraj A (2011) "Analysis of the characteristics and trusted security of cloud computing" International Journal on Cloud Computing Services and Architecture (IJCCSA) Vol. 1, No 3 November, 2011.
  5. Rashidi Ahmad and Movahhedinia Naser (2012) "A Model for User Trust in Cloud Computing" International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol. 2, No. 2, April 2012.
  6. Sara Qaisar, Khawaja Kausar Fiaz (2012) "Cloud Computing: Network/Security Threats and Countermeasures" Interdisciplinary Journal of Contemporary Research in Business. Vol. 3, No 9, January, 2012.
  7. Raj Gaurav, Katoch Munish (2012) "Security Implementation through PCRE Signature over Cloud Network" Advanced Computing: An International Journal (ACIJ), Vol. 3, No. 3, May 2012.
  8. Ms. Shelke Parag K. , Ms. Sontakke Sneha, Dr. Gawande A. D. (2012) "Intrusion Detection System for Cloud Computing" International Journal of Scientific & Technology Research Vol. 1, May, 2012.
  9. Grobauer Bernd, Walloschek Tobias, Stöcker Elmar (2011) "Understanding Cloud Computing Vulnerabilities" Security & Privacy, IEEE Vol. 9, 2011.
  10. SAIKIRAN B (2012) "Advance Techniques for the Detection of Interruption Alerts" International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol 3, Issue 4, 2012, pp 424-429
  11. M. Madhavi (2012) "An Approach For Intrusion Detection System In Cloud Computing" International Journal
  12. Reddy V. Krishna (2011) "Security Architecture of Cloud Computing" International Journal of Engineering Science and Technology (IJEST), ISSN: 0975-5462 Vol. 3, 2011.
  13. Peter Mell, Timothy Grance (2011). National Institute of Standards and Technology Retrieved from http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf
  14. Phil Cox (2012). Intrusion Detection in a cloud computing. Retrievedfromhttp://searchcloudcomputing. techtarget. com/tip/Intrusion-detection-in-a-cloud-computing-environment.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Rule Generator (CRG) Host Based IDS (HIDS) Network Based IDS (NIDS)