CIDS: A Framework for Intrusion Detection in Cloud Systems

By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.

[1]  Alfonso Valdes,et al.  An Approach to Sensor Correlation , 2000 .

[2]  Wayne A. Jansen,et al.  Intrusion detection with mobile agents , 2002, Comput. Commun..

[3]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[4]  Chao-Tung Yang,et al.  Integrating grid with intrusion detection , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[5]  M. F. Tolba,et al.  GIDA : Toward Enabling Grid Intrusion Detection Systems , 2005 .

[6]  Hisham A. Kholidy A study for access control flow analysis with a proposed job analyzer component based on stack inspection methodology , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.

[7]  Dan Andersson,et al.  Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis , 2001 .

[8]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[9]  Stuart Kenny,et al.  Towards a Grid-wide Intrusion Detection System , 2005, EGC.

[10]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[11]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[12]  Boleslaw K. Szymanski,et al.  Sequence alignment for masquerade detection , 2008, Comput. Stat. Data Anal..

[13]  Abderrahim Sekkaki,et al.  Intrusion Detection for Computational Grids , 2008, 2008 New Technologies, Mobility and Security.

[14]  Chao-Tung Yang,et al.  A performance-based grid intrusion detection system , 2005, 29th Annual International Computer Software and Applications Conference (COMPSAC'05).

[15]  Xiaoshe Dong,et al.  GHIDS: Defending Computational Grids against Misusing of Shared Resources , 2006, 2006 IEEE Asia-Pacific Conference on Services Computing (APSCC'06).

[16]  Azman Samsudin,et al.  Grid-based intrusion detection system , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).

[17]  Christopher Krügel,et al.  Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.

[18]  Wayne Jansen,et al.  Applying Mobile Agents to Intrusion Detection and Response , 1999 .

[19]  Richard J. Feiertag,et al.  A separation model for virtual machine monitors , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[20]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[21]  Kamalrulnizam Abu Bakar,et al.  Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.

[22]  W. A. Jansen,et al.  MOBILE AGENTS AND SECURITY , 1999 .

[23]  Paul Scerri,et al.  Coordination of Large-Scale Multiagent Systems , 2005 .