CFP last date
20 May 2024
Reseach Article

Risk Assessment in Cloud using Layered Intrusion Detection System

Published on June 2013 by Soumya Mathew
International Conference on Current Trends in Advanced Computing ICCTAC 2013
Foundation of Computer Science USA
ICCTAC - Number 1
June 2013
Authors: Soumya Mathew
ad80e720-6c6e-4ed5-996b-ebbee95834b4

Soumya Mathew . Risk Assessment in Cloud using Layered Intrusion Detection System. International Conference on Current Trends in Advanced Computing ICCTAC 2013. ICCTAC, 1 (June 2013), 26-30.

@article{
author = { Soumya Mathew },
title = { Risk Assessment in Cloud using Layered Intrusion Detection System },
journal = { International Conference on Current Trends in Advanced Computing ICCTAC 2013 },
issue_date = { June 2013 },
volume = { ICCTAC },
number = { 1 },
month = { June },
year = { 2013 },
issn = 0975-8887,
pages = { 26-30 },
numpages = 5,
url = { /proceedings/icctac/number1/12266-1308/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Current Trends in Advanced Computing ICCTAC 2013
%A Soumya Mathew
%T Risk Assessment in Cloud using Layered Intrusion Detection System
%J International Conference on Current Trends in Advanced Computing ICCTAC 2013
%@ 0975-8887
%V ICCTAC
%N 1
%P 26-30
%D 2013
%I International Journal of Computer Applications
Abstract

Cloud Computing is defined as a technology that uses internet and there is a central remote server to maintain the data and applications. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms and are widely used in organizations. Because of their distributed nature, cloud computing environments are easy targets for intruders looking for possible vulnerabilities to exploit. However, with the extensive use of cloud computing, security issues came out on a growing scale. It is necessary to solve these security issues to promote the wider applications of cloud computing. To provide secure and reliable services in cloud computing environment is an important issue. Therefore, a Cloud computing system needs to contain some Intrusion Detection Systems (IDSs) for protecting each virtual machine against threats. In this case there exists a trade-off between the security level of IDS and the system performance. If the IDS provide stronger security services using more rules or patterns, then it needs much more computational resources in proportion to the strength of security. Another problem in Cloud Computing is that, it is hard to analyse huge amount of logs by system administrators. The objective of the paper is to propose a risk assessment method that enables Cloud Computing System to achieve both effectiveness of using the system resources and strength of the security service without trade-off between them.

References
  1. H. Debar, M. Dacier, and A. Wespi, "Towards a Taxonomy of Intrusion Detection Systems," Int'l J. Computer and Telecommunications Networking, vol. 31, no. 9, 1999, pp. 805–822.
  2. S. Axelsson, Research in Intrusion-Detection Systems: A Survey, tech. report TR-98-17, Dept. Computer Eng. ,Chalmers Univ. of Technology, 1999.
  3. S. Kenny and B. Coghlan, "Towards a Grid-Wide Intrusion Detection System," Proc. European Grid Conf. (EGC 05), Springer, 2005, pp. 275–284.
  4. M. Tolba et al. , "Distributed Intrusion Detection System for Computational Grids," Proc. 2nd Int'l Conf. Intelligent Computing and Information Systems (ICICIS 05), 2005.
  5. F-Y. Leu et al. , "Integrating Grid with Intrusion Detection," Proc. Int'l Conf. Advanced Information Networking and Applications (AINA 05), vol. 1, IEEE CS Press, 2005, pp. 304–309.
  6. Sebastian Roschke, Feng Cheng, Christoph Meinel," Intrusion Detection in the Cloud".
  7. Vieira, K. Schulter, A. Westphall, C. B. Westphall, C. M. "Intrusion Detection for Grid and Cloud Computing" IEEE computer society July-Aug. 2010 12, issue 4, pp. 38 – 43.
  8. Jun Ho Lee, Min Woo Park, Jung Ho Ecom"Multi-level Itrusion Detection and Log Management in Cloud Computing" IEEE computer society Feb. 2011, pp 552-555.
  9. Gruschka N, Iancono LL, Jensen M and Schwenk J, 'On Technical Security Issues in Cloud Computing', '09 IEEE International Conference on Cloud Computing, pp 110-112, 2009.
  10. Ramgovind S. Eloff MM,Smith E,"The Management of Security in Cloud Computing",School of Computing,university of South Africa,Published in the IEEE international conference on 2010.
  11. H. Takabi, J. B. D. Joshi and G. Ahn, Security and Privacy Challenges in Cloud Computing Environments, Security & Privacy, IEEE, 8 (2010), pp. 24-31.
  12. Wang xin,Huang ting-lei,Liu Xiao-yu,"Research on the Intrusion Detection Mechanism based on Cloud Computing",published in International journal on Infrastructures for Collaborative Enterprises. on 2010.
  13. Chi-Chun Lo,Chun-Chieh Huang,"A Cooperative Intrusion Detection System Framework for cloud Computing Networks" on 2010 39th International Conference on Parallel Processing.
Index Terms

Computer Science
Information Sciences

Keywords

Risk Assessment Cloud Computing Layered Intrusion Detection