A feasible approach to intrusion detection in virtual network layer of Cloud computing

Intrusion detection/prevention is the greatest security challenge at virtual network layer of Cloud computing. To address this challenge, there have been several security frameworks reported. However, still there is a scope of addressing newer challenges. Here, we propose a security framework to detect network intrusions in Cloud computing. This framework uses Snort and combination of different classifiers, viz Bayesian, Associative and Decision tree. We deploy our intrusion detection system (IDS) sensors on each host machine of Cloud. These sensors correlate intrusive alerts from each region of Cloud in order to identify distributed attacks. For feasibly analysis and functional validation of this framework, we perform different experiments in real time and offline simulation.

[1]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[2]  Irfan Gul,et al.  Distributed Cloud Intrusion Detection Model , 2011 .

[3]  Shubhangi L. Vaikole,et al.  Intrusion Detection System in Cloud Computing Environment , 2012 .

[4]  C. N. Modi,et al.  Bayesian Classifier and Snort based network intrusion detection system in cloud computing , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[5]  Ayush Sharma,et al.  Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.

[6]  D. S. Yeung,et al.  Comparison of different fusion approaches for network intrusion detection using ensemble of RBFNN , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[7]  Ajith Abraham,et al.  A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment , 2013, Int. J. Distributed Sens. Networks.

[8]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[9]  Chi-Chun Lo,et al.  A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[10]  Santosh Biswas,et al.  Towards reducing false alarms in network intrusion detection systems with data summarization technique , 2013, Secur. Commun. Networks.

[11]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[12]  Christoph Meinel,et al.  An Extensible and Virtualization-Compatible IDS Management Architecture , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[13]  O. KuyoroS.,et al.  Cloud computing security issues and challenges , 2011 .

[14]  P. S. Avadhani,et al.  A comparison of data mining techniques for intrusion detection , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

[15]  Mahmod S. Mahmod,et al.  A COMPARISON STUDY FOR INTRUSION DATABASE (KDD99, NSL-KDD) BASED ON SELF ORGANIZATION MAP (SOM) ARTIFICIAL NEURAL NETWORK , 2013 .

[16]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[17]  R. Chitra,et al.  Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .

[18]  R. Geetha Ramani,et al.  Discriminant Analysis based Feature Selection in KDD Intrusion Dataset , 2011 .

[19]  Jianquan Ouyang,et al.  Network Intrusion Detection Model based on Fuzzy Support Vector Machine , 2013, J. Networks.

[20]  Yi Yu,et al.  An Attribute-weighted Clustering Intrusion Detection Method , 2013, J. Networks.

[21]  Muttukrishnan Rajarajan,et al.  Framework for distributed and self-healing hybrid intrusion detection and prevention system , 2013, 2013 International Conference on ICT Convergence (ICTC).

[22]  Shailendra Singh,et al.  An ensemble approach for feature selection of Cyber Attack Dataset , 2009, ArXiv.

[23]  Fabrizio Baiardi,et al.  CIDS: A Framework for Intrusion Detection in Cloud Systems , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[24]  Sudhir N. Dhage,et al.  Intrusion detection system in cloud computing environment , 2012, Int. J. Cloud Comput..

[25]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[26]  Muttukrishnan Rajarajan,et al.  A novel framework for intrusion detection in cloud , 2012, SIN '12.

[27]  Stephen Biggs,et al.  Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[28]  Kagan Tumer,et al.  Classifier ensembles: Select real-world applications , 2008, Inf. Fusion.

[29]  Malcolm I. Heywood,et al.  Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.

[30]  Dhiren R. Patel,et al.  A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[31]  Roberto Bifulco,et al.  Integrating a network IDS into an open source Cloud Computing environment , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[32]  Muttukrishnan Rajarajan,et al.  Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing , 2012 .

[33]  Sanjay Ram Secure cloud computing based on mutual intrusion detection system , 2012 .

[34]  Kamalrulnizam Abu Bakar,et al.  Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.