A Survey on Intrusion Detection Systems for Cloud Computing Environment

Cloud Computing is a newly emerged technology. It is getting popularity day by day due to its amazing services. The applications and services based on the cloud are emerging day by day. Due to networked nature of the cloud, resources, data and applications are vulnerable to the attack in cloud environment. So Intrusion Detection Systems (IDS) are employed in the cloud to detect malicious behaviour in the network and in the host. IDS monitors network or host system activities by collecting network information, and analyzes this information for malicious activities and generate alarms, if intrusion takes place. In this paper we surveyed various types of Intrusion Detection Systems proposed over the years for Cloud Computing environment.

[1]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[2]  Lei Li,et al.  A novel rule-based Intrusion Detection System using data mining , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[3]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[4]  R. Chitra,et al.  Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .

[5]  Carlos Gershenson,et al.  Artificial Neural Networks for Beginners , 2003, ArXiv.

[6]  Sugata Sanyal,et al.  Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[7]  Chi Cheng,et al.  Extreme learning machines for intrusion detection , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[8]  Venus W. Samawi,et al.  One-rule Genetic-Fuzzy classifier , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[9]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[10]  Wanlei Zhou,et al.  Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..

[11]  Idris Bharanidharan Shanmugam,et al.  Hybrid intelligent Intrusion Detection System , 2005 .

[12]  Hervé Debar,et al.  The Intrusion Detection Message Exchange Format (IDMEF) , 2007, RFC.

[13]  Hu Zhengbing,et al.  A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining , 2008, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008).

[14]  Tianrui Li,et al.  Intrusion detection system based on new association rule mining model , 2005, 2005 IEEE International Conference on Granular Computing.

[15]  A. D. Gawande,et al.  INTRUSION DETECTION SYSTEM FOR CLOUD COMPUTING , 2012 .

[16]  Min-Woo Park,et al.  Multi-level Intrusion Detection System and log management in Cloud Computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[17]  Yizhang Guan,et al.  A CP Intrusion Detection Strategy on Cloud Computing , 2009 .

[18]  Weiqing Sun,et al.  Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[19]  Pratit Santiprabhob Fuzzy Intrusion Detection System , 2002 .

[20]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[21]  L. Ibrahim ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .

[22]  K. Anand,et al.  Genetic Algorithm Approach to Intrusion Detection System , 2012 .

[23]  Wei Li,et al.  Using Genetic Algorithm for Network Intrusion Detection , 2004 .

[24]  Chi-Chun Lo,et al.  A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[25]  Rossouw von Solms,et al.  The utilization of artificial intelligence in a hybrid intrusion detection system , 2002 .

[26]  Shubhangi L. Vaikole,et al.  Intrusion Detection System in Cloud Computing Environment , 2012 .

[27]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[28]  Tal Garfinkel,et al.  A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.

[29]  Salim Hariri,et al.  An efficient network intrusion detection method based on information theory and genetic algorithm , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[30]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[31]  Helen J. Wang,et al.  SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[32]  Rebecca Gurley Bace,et al.  Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[33]  Anup Goyal,et al.  GA-NIDS : A Genetic Algorithm based Network Intrusion Detection System , 2007 .

[34]  Qing-Wei Liu,et al.  Intrusion scenarios detection based on data mining , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[35]  Animesh Kumar,et al.  Zero Day Exploit , 2014 .

[36]  Mehdi MORADI,et al.  A Neural Network Based System for Intrusion Detection and Classification of Attacks , 2004 .

[37]  Kamalrulnizam Abu Bakar,et al.  Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.

[38]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).

[39]  D. Mudzingwa,et al.  A study of methodologies used in intrusion detection and prevention systems (IDPS) , 2012, 2012 Proceedings of IEEE Southeastcon.

[40]  Khaled Salah,et al.  EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.

[41]  Gouda I. Salama,et al.  Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System , 2009 .

[42]  Li-Yong Ren,et al.  Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[43]  Zhi Wang,et al.  DKSM: Subverting Virtual Machine Introspection for Fun and Profit , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[44]  Brahim Belhaouari Samir,et al.  An approach towards intrusion detection using PCA feature subsets and SVM , 2012, 2012 International Conference on Computer & Information Science (ICCIS).

[45]  S VivinSandar,et al.  Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks , 2012 .

[46]  Angelos D. Keromytis,et al.  Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.

[47]  Patrick Martin,et al.  IDSaaS: Intrusion Detection System as a Service in Public Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).