A Host-Based Intrusion Detection System

A host-based intrusion detection system for Cloud environment is reported in this chapter along with its laboratory analysis. This module alerts the Cloud user against the malicious activities within the system by analysing the system call traces. It analyses only selective system call traces, the failed system call trace, rather than all. This module provides an early detection of the intrusion and works as the security to the infrastructure layer of the Cloud environment.

[1]  Sateesh K. Peddoju,et al.  DEPLOYING A PRIVATE CLOUD? GO THROUGH THE ERRORS FIRST , 2013 .

[2]  Michael Schatz,et al.  Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.

[3]  Tao Chen,et al.  A new data normalization method for unsupervised anomaly intrusion detection , 2009, Journal of Zhejiang University SCIENCE C.

[4]  Philip K. Chan,et al.  Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .

[5]  Dave Cliff,et al.  A financial brokerage model for cloud computing , 2011, Journal of Cloud Computing: Advances, Systems and Applications.

[6]  Santosh Biswas,et al.  An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification , 2013, ArXiv.

[7]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[8]  Frank Doelitzscher,et al.  An agent based business aware incident detection system for cloud environments , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[9]  Sateesh K. Peddoju,et al.  HIDS: A host based intrusion detection system for cloud computing environment , 2014, International Journal of System Assurance Engineering and Management.

[10]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[11]  Barak A. Pearlmutter,et al.  Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[12]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[13]  V. Rao Vemuri,et al.  Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric , 2006 .

[14]  Philip K. Chan,et al.  Learning Useful System Call Attributes for Anomaly Detection , 2005, FLAIRS Conference.

[15]  Terry R. Payne,et al.  Experience with Rule Induction and k-Nearest Neighbor Methods for Interface Agents that Learn , 1997, IEEE Trans. Knowl. Data Eng..

[16]  L Vokorokos,et al.  Host-based intrusion detection system , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.

[17]  Simone A. Ludwig,et al.  Immune network algorithm applied to the optimization of composite SaaS in cloud computing , 2015, 2015 IEEE Congress on Evolutionary Computation (CEC).

[18]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[19]  Charu C. Aggarwal,et al.  A Survey of Text Classification Algorithms , 2012, Mining Text Data.

[20]  Marc Dacier,et al.  Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.

[21]  Kyaw Thet Khaing,et al.  Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System , 2013 .