Abstract Cloud Computing is an internet-based computing paradigm, where dynamically scalable and virtualized shared resources are pro- vided to customers on demand. It becomes widespread thanks to its concepts that boost availability and accessibility of information on the network. However, the open nature of this technology exposes it to serious vulnerabilities related to security flaws occurred while interactions to execute required services. Intrusion Detection System (IDS) is a stronger strategy to provide security, through monitoring data environment to detect attacks in order to prevent their expansion. In this paper, we propose efficient, reliable and secure IDS based on mobile agent paradigm and cryptographic mechanisms. According to this, an agent can move among cloud data servers to collect data or execute services, while keeping a cryptographic trace of the actions, actors, results and data involved in the execution. Based on a chaining mechanism, these cryptographic traces including signed data, encrypted and hashed code statements, allow the identification of intrusions and their origins. We have implemented a cloud environment to integrate our proposed IDS, and conducted detailed experiments to evaluate its response time, network load and detection performance compared to the traditional Client/Server architecture.
[1]
Fabrizio Baiardi,et al.
CIDS: A Framework for Intrusion Detection in Cloud Systems
,
2012,
2012 Ninth International Conference on Information Technology - New Generations.
[2]
Peter Braun,et al.
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
,
2004
.
[3]
Rajkumar Buyya,et al.
CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
,
2011,
Softw. Pract. Exp..
[4]
Damianos Gavalas,et al.
A mobile agent platform for distributed network and systems management
,
2009,
Journal of Systems and Software.
[5]
Vijay Varadharajan,et al.
Intrusion Detection Techniques for Infrastructure as a Service Cloud
,
2011,
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[6]
David L. Mills,et al.
Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification
,
2010
.