A Cooperative Intrusion Detection Model for Cloud Computing Networks

While cloud computing provides a convenient and efficient network environment for users to obtain powerful computing resources, it also brings some important security issues about data security and reliable services. One of the major security issues is to deal with malicious attacks. To cope with these attacks in this paper, a collaborative intrusion detection architecture is proposed and the E-CARGO model is used to model this system. According to CIDF (Common Intrusion Detection Frame), the components of the intrusion detection system are defined. Furthermore, we design and clearly describe the behaviors of Agent and their interrelationship. At last, experiments are used to verify our method’s effectiveness.

[1]  Fu Xiu-fen Cooperative network intrusion detection based on data fusion , 2009 .

[2]  Chi-Chun Lo,et al.  A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[3]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[4]  Sun Guo-zi Novel Cloud Computing Intrusion Detection Model Based on Improved Manifold Learning , 2010 .

[5]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[6]  MengChu Zhou,et al.  M-M Role-Transfer Problems and Their Solutions , 2009, IEEE Trans. Syst. Man Cybern. Part A.

[7]  Jaideep Chandrashekar,et al.  When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions , 2006, AAAI.

[8]  Hongle Du,et al.  A Cooperative Network Intrusion detection Based on Fuzzy SVMs , 2010, J. Networks.

[9]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..

[10]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[11]  MengChu Zhou,et al.  Efficient Role Transfer Based on Kuhn–Munkres Algorithm , 2012, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[12]  Zhang Min,et al.  Study on Cloud Computing Security , 2011 .

[13]  Eugene H. Spafford,et al.  Intrusion detection using autonomous agents , 2000, Comput. Networks.

[14]  MengChu Zhou,et al.  Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).