Cloud computing is services which provides computing resources to each customer. There are various issues that need to be dealt with respect t o security and privacy in a cloud computing scenari o. One of the security issues is how to reduce the impact of denial of- service (DoS) attack or distributed den ial-of-service (DDoS) or many other different attacks in this envi ronment. To counter these kinds of attacks a intrus ion detection system is highly needed for protecting ea ch virtual machine against threats. An Intrusion de tection System (IDS) constantly monitors actions in a certa in environment and decides whether they are part of a possible hostile attack or a legitimate use of the environment. If the IDS provide stronger security s ervice using more rules or patterns, then it needs much more computing resources in proportion to the strength of s ecurity. So the amount of resources allocating for customers decreases. In this paper, we propose a method that enables cloud computing system to achieve both electiveness of using the system resource and strength of the s ecurity service without trade-off between them.
[1]
Roberto Bifulco,et al.
Integrating a network IDS into an open source Cloud Computing environment
,
2010,
2010 Sixth International Conference on Information Assurance and Security.
[2]
Irfan Gul,et al.
Distributed Cloud Intrusion Detection Model
,
2011
.
[3]
Carla Merkle Westphall,et al.
Intrusion Detection for Grid and Cloud Computing
,
2010,
IT Professional.
[4]
Fabrizio Baiardi,et al.
CIDS: A Framework for Intrusion Detection in Cloud Systems
,
2012,
2012 Ninth International Conference on Information Technology - New Generations.
[5]
Christoph Meinel,et al.
Intrusion Detection in the Cloud
,
2009,
2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.