Open Access Open Access  Restricted Access Subscription Access

Cloud Security: A Multi Agent Approach Based Intrusion Detection System


Affiliations
1 Department of Computer Science, Cadi Ayyad University, Marrakech, Morocco
 

The security is the biggest problem of cloud computing, it needs some Intrusion Detection Systems (IDSs) for detecting and preventing attacks in this environment. Multi Agents Systems (MAS) are distributed systems ideally designed and implanted as a set of agents interacting to solve issues that may exceed the capabilities of each individual agent. This approach provides an intelligent self-administered and fault-tolerant intrusion detection system with continuous execution time and minimal human intervention due to the use of Multi agent security systems has been monitored and automatically controlled in the cloud.

Keywords

Attack, Cloud Computing, Intrusion Detection System, Multi Agents Systems, Mobile Agent, Security
User

Abstract Views: 201

PDF Views: 0




  • Cloud Security: A Multi Agent Approach Based Intrusion Detection System

Abstract Views: 201  |  PDF Views: 0

Authors

Omar Achbarou
Department of Computer Science, Cadi Ayyad University, Marrakech, Morocco
My Ahmed El Kiram
Department of Computer Science, Cadi Ayyad University, Marrakech, Morocco
Salim Elbouanani
Department of Computer Science, Cadi Ayyad University, Marrakech, Morocco

Abstract


The security is the biggest problem of cloud computing, it needs some Intrusion Detection Systems (IDSs) for detecting and preventing attacks in this environment. Multi Agents Systems (MAS) are distributed systems ideally designed and implanted as a set of agents interacting to solve issues that may exceed the capabilities of each individual agent. This approach provides an intelligent self-administered and fault-tolerant intrusion detection system with continuous execution time and minimal human intervention due to the use of Multi agent security systems has been monitored and automatically controlled in the cloud.

Keywords


Attack, Cloud Computing, Intrusion Detection System, Multi Agents Systems, Mobile Agent, Security



DOI: https://doi.org/10.17485/ijst%2F2017%2Fv10i18%2F149602