CFP last date
20 May 2024
Reseach Article

A Clustering based Intrusion Detection System for Storage Area Network

by Garima Singh, Anubhav Patrick, Lucky Rajpoot
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 9
Year of Publication: 2014
Authors: Garima Singh, Anubhav Patrick, Lucky Rajpoot
10.5120/15380-3804

Garima Singh, Anubhav Patrick, Lucky Rajpoot . A Clustering based Intrusion Detection System for Storage Area Network. International Journal of Computer Applications. 88, 9 ( February 2014), 14-18. DOI=10.5120/15380-3804

@article{ 10.5120/15380-3804,
author = { Garima Singh, Anubhav Patrick, Lucky Rajpoot },
title = { A Clustering based Intrusion Detection System for Storage Area Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 9 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number9/15380-3804/ },
doi = { 10.5120/15380-3804 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:07:10.449233+05:30
%A Garima Singh
%A Anubhav Patrick
%A Lucky Rajpoot
%T A Clustering based Intrusion Detection System for Storage Area Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 9
%P 14-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A storage area network (SAN) is a high-speed and widely used special-purpose network that interconnects different kinds of storage devices with associated data servers on behalf of a larger network of users. SAN security is a specialized field dealing with issues related to the storage industry, it follows the same established principles found in all modern IT security. Therefore, it requires a continuous process of evaluating SAN environment's current state of security against the constant changes brought about by innovations in technology and an increase in awareness concerning security issues. This paper is all about intrusion detection in storage area network, and more important, how to detect and prevent suspicious activity of an unauthorized user by maintaining an audit record. This paper proposes an approach to detect an intrusion attack by clustering (k-mean) (to identify groups of similar behaved object, i. e. malicious and non-malicious activity), classification technique (to classify all data into particular class categories).

References
  1. William Stallings, "Intruders" in Cryptography and Network Security, Fourth Edition, Prentice Hall, 2005, pp 565-594
  2. Jon Tate et al. , "Introduction" in Introduction to Storage Area Networks and System Networking, IBM, 2012, pp 11-12
  3. Storage Area Network, en. wikipedia. org/wiki/ Storage_area_network
  4. Barry Phillips, "Have Storage Area Networks Come of Age?" in Computer Volume: 31, Issue: 7, 1998
  5. Jiawei Han and Micheline Kambler, "Cluster Analysis" in Data Mining Concepts and Techniques, Second Edition, Morgan Kaufmann Publishers, 2006, pp 383
  6. Yacine Djemaiel et al. , "Dynamic detection and tolerance of attacks in Storage Area Networks" in 22nd International Conference on Advanced Information Networking and Applications – Workshops 2008
  7. Mohammad Banikazemi et al. , "Storage-Based Intrusion Detectionfor Storage Area Networks (SANs)" in Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies 2005
  8. Adam G. Pennington et al. , "Storage-based intrusion detection: watching storage activity for suspicious behavior" in SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12, Pages 10 – 10, August 4–8, 2003
  9. Yacine Djemaiel et al. , "An intrusion tolerant transaction management model for Wireless Storage Area Networks" in Computer and Information Technology (WCCIT), 2013 World Congress, 22-24 June 2013
  10. A. Elmagarmid Y. Leu and N. Boudriga, "Specification and execution of transactions for advanced database applications", Technical report, Purdue University, 1990
  11. Sandeep Abhang et al. , "Design issues of 'Vulnerabilities and Suspicious behavior detection system' in Storage Area Network (SAN)" in International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009
  12. P. Mahalingam et al. , "Enhanced Data Security Framework for Storage Area Networks" in 2009 Second International Conference on Environmental and Computer Science
  13. "KDD Cup Data," http://kdd. ics. uci. edu/databases/ kddcup99/kddcup99. htm
  14. Jiwu Shu et al. , "Design and Implementation of an SAN System Based on the Fiber Channel Protocol" in IEEE Transactions On Computers, Vol. 54, No. 4, April 2005
  15. Zhenwei Yu, "An Automatically Tuning Intrusion Detection System" in IEEE Transactions On Systems, Man, And Cybernetics—Part B: Cybernetics, Vol. 37, No. 2, April 2007
  16. Ekgapark Wonghirunsombat et al. , "A Centralized Management Framework of Network based Intrusion Detection and Prevention System" in 10th International Joint Conference on Computer Science and Software Engineering (JCSSE), 2013
Index Terms

Computer Science
Information Sciences

Keywords

SAN observer IDS manager host agent module SAN observer module manager module