Open Access Open Access  Restricted Access Subscription Access

Hybrid Intrusion Detection System for Private Cloud & Public Cloud


Affiliations
1 Dept of CSE Mody, University of Science and Technology, Lakshmangarh, India
 

Internet based applications and data storage services can be easily acquired by the end users by the permission of Cloud computing. Providing security to the cloud computing environment has become important issue with the increased demand of cloud computing. Other than the traditional security methods, additional methods like control access, confidentiality, firewalls and user authentication are required in order to provide security to the cloud computing environment. One of the needful components in terms of cloud security is Intrusion Detection System (IDS). To detect various attacks on cloud, Intrusion Detection System (IDS) is the most commonly used mechanism. This paper discusses about the intrusion detection and different intrusion detection techniques namely anomaly based techniques and signature based techniques.


Keywords

Cloud Computing, Intrusion Detection System, Anomaly Based Intrusion Detection System, Misuse Based Intrusion Detection System.
User
Notifications
Font Size

  • S.V. Narwane and S.L Vaikol, “Intrusion Detection System in Cloud Computing Environment”, International Conference on Advances in Communication and Computing Technologies (ICACACT), 2012.
  • Deris Stiawan, Abdul Hanan Abdullah and Mohd. Yazid Idris, “Characterizing Network Intrusion Prevention System”, International Journal of Computer Applications, Vol.14, No.1, 2011.
  • Eugene Gorelik, “Cloud Computing Models”, Massachusetts Institute of Technology Cambridge, MA 02142, 2013-01.
  • Pradeep Kumar Tiwari and Dr. Bharat Mishra,” Cloud Computing Security Issues, Challenges and Solutions”, International Journal of Emerging Technology and Advanced Engineeering, ISSN 2250-2459, Volume 2, Issue 8, August 2012.
  • Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel and Muttukrishnan Rajaranjan,” A survey of Intrusion detection techniques in cloud”, Journal of Network and Computer Applications, pp.42-57, 2013.
  • AhmedPatel, Mona Taghavi, Kaveh Bakhtiyari and Joaquim Celestino junior, “An intrusion detection and prevention system in cloud computing: A systematic review”, Journal of Network and Computer Applications, Volume 36, Issue 1, pp.25-41, 2013.
  • V.Jyothsna, V.V. Rama Prasad and K Munivara Prasad, “A Review of Anomaly Based Intrusion Detection System, International Journal of Computer Applications, Vol.28- No.7, 2011.
  • M.M.M.Hassan,” Current Studies on Intrusion Detection System, Genetic Algorithm and Fuzzy Logic”, International Journal of Distributed and Parallel Systems, Vol.4, No.2, pp.35-47, 2013.
  • Ms. Parag K Shelke, Ms. Sneha Sontakke and Dr. A. D. Gawande, “Intrusion Detection System for Cloud Computing”, International Journal of Scientific & Technology Research,Vol.1,ISSN 2277-8616, 2012.
  • Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah and Al-Sakib khan Pathan,”IDPS: An integrated Intrusion Handling Model for Cloud Computing Environment, International Journal of Computing and Information Technology (IJCIT), 2012.
  • Ms. Parag K Shelke, Ms. Sneha Sontakke and Dr. A. D. Gawande, “Intrusion Detection System for Cloud Computing”, International Journal of Scientific & Technology Research,Vol.1,ISSN 2277-8616, 2012.

Abstract Views: 178

PDF Views: 0




  • Hybrid Intrusion Detection System for Private Cloud & Public Cloud

Abstract Views: 178  |  PDF Views: 0

Authors

Riddhi Gaur
Dept of CSE Mody, University of Science and Technology, Lakshmangarh, India
Uma Kumari
Dept of CSE Mody, University of Science and Technology, Lakshmangarh, India

Abstract


Internet based applications and data storage services can be easily acquired by the end users by the permission of Cloud computing. Providing security to the cloud computing environment has become important issue with the increased demand of cloud computing. Other than the traditional security methods, additional methods like control access, confidentiality, firewalls and user authentication are required in order to provide security to the cloud computing environment. One of the needful components in terms of cloud security is Intrusion Detection System (IDS). To detect various attacks on cloud, Intrusion Detection System (IDS) is the most commonly used mechanism. This paper discusses about the intrusion detection and different intrusion detection techniques namely anomaly based techniques and signature based techniques.


Keywords


Cloud Computing, Intrusion Detection System, Anomaly Based Intrusion Detection System, Misuse Based Intrusion Detection System.

References





DOI: https://doi.org/10.13005/ojcst%2F10.02.26