Effective Analysis of Cloud Based Intrusion Detection System

The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). People are paid more attention on intrusion detection which as an important computer network security technology. According to the development trend of intrusion detection, detecting all kinds of intrusions effectively requires a global view of the monitored network, Here, discuss about new intrusion detection mechanism based on cloud computing, which can make up for the deficiency of traditional intrusion detection, and proved to be great scalable.

[1]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[2]  Julien Bourgeois,et al.  A Global Security Architecture for Intrusion Detection on Computer Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[3]  Daniele Sgandurra,et al.  Cloud Security Is Not (Just) Virtualization Security , 2009 .

[4]  Tim Mather,et al.  Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.

[5]  Anders Eriksson,et al.  What Networking of Information Can Do for Cloud Computing , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[6]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[7]  Stefan Axelsson Research in Intrusion-Detection Systems: A Survey , 1998 .

[8]  Igor Muttik,et al.  Cloud security technologies , 2009, Inf. Secur. Tech. Rep..

[9]  N.B. Idris,et al.  Artificial Intelligence Techniques Applied to Intrusion Detection , 2005, 2005 Annual IEEE India Conference - Indicon.

[10]  A. Halim Zaim,et al.  A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..

[11]  B Busby Security on the Internet. , 1997, Health physics.

[12]  Carlos Becker Westphall,et al.  Improvements in the model for interoperability of intrusion detection responses compatible with the IDWG model , 2007, Int. J. Netw. Manag..

[13]  Abderrahim Sekkaki,et al.  Intrusion Detection for Computational Grids , 2008, 2008 New Technologies, Mobility and Security.

[14]  Wayne Jansen,et al.  Applying Mobile Agents to Intrusion Detection and Response , 1999 .