Efficient approaches for intrusion detection in cloud environment

Intrusion Detection System is one of the challenging research areas in Cloud Security. Security incidents such as Denial of service, scanning, malware code injection, virus, worm and password cracking are becoming common in cloud environment. These attacks can become a threat to the reputation of the company and can also cause financial loss if not detected on time. Hence securing the cloud from these types of attacks is very important. In this paper, we have proposed techniques to secure cloud environment by incorporating some of the efficient approaches in intrusion detection. We have focused on two major issues in IDS: efficient detection mechanism and speed of detection. We have proposed approaches to tackle these issues using Machine Learning and parallelization. We have also provided security frameworks to demonstrate how these approaches will be deployed in Cloud Environment. A preliminary analysis was conducted for some of the approaches and results are promising.

[1]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[2]  Jin Tong,et al.  NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292) , 2012 .

[3]  Min-Woo Park,et al.  Multi-level Intrusion Detection System and log management in Cloud Computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[4]  Wenjuan Li,et al.  Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[5]  M. F. Augusteijn,et al.  Neural network classification and novelty detection , 2002 .

[6]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[7]  Chih-Hung Lin,et al.  Efficient and effective NIDS for cloud virtualization environment , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[8]  Vijay Varadharajan,et al.  Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.

[9]  Muttukrishnan Rajarajan,et al.  A novel framework for intrusion detection in cloud , 2012, SIN '12.

[10]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[11]  Errin W. Fulp,et al.  Distributed Data Parallel Techniques for Content-Matching Intrusion Detection Systems , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[12]  Te-Shun Chou,et al.  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .

[13]  M. Cajkovsky,et al.  A distributed network intrusion detection system architecture based on computer stations using GPGPU , 2013, 2013 IEEE 17th International Conference on Intelligent Engineering Systems (INES).

[14]  Yacine Bouzida,et al.  Neural networks vs . decision trees for intrusion detection , 2006 .

[15]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.