Intrusion Detection System for Cloud Computing

Cloud computing is services which provides computing resources to each customer. There are various issues that need to be dealt with respect t o security and privacy in a cloud computing scenari o. One of the security issues is how to reduce the impact of denial of- service (DoS) attack or distributed den ial-of-service (DDoS) or many other different attacks in this envi ronment. To counter these kinds of attacks a intrus ion detection system is highly needed for protecting ea ch virtual machine against threats. An Intrusion de tection System (IDS) constantly monitors actions in a certa in environment and decides whether they are part of a possible hostile attack or a legitimate use of the environment. If the IDS provide stronger security s ervice using more rules or patterns, then it needs much more computing resources in proportion to the strength of s ecurity. So the amount of resources allocating for customers decreases. In this paper, we propose a method that enables cloud computing system to achieve both electiveness of using the system resource and strength of the s ecurity service without trade-off between them.

[1]  Roberto Bifulco,et al.  Integrating a network IDS into an open source Cloud Computing environment , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[2]  Irfan Gul,et al.  Distributed Cloud Intrusion Detection Model , 2011 .

[3]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[4]  Fabrizio Baiardi,et al.  CIDS: A Framework for Intrusion Detection in Cloud Systems , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[5]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.