+ All Categories
Home > Documents > AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer...

AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer...

Date post: 25-Apr-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
7
VOL. 12, NO. 12, JUNE 2017 ISSN 1819-6608 ARPN Journal of Engineering and Applied Sciences ©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved. www.arpnjournals.com 3723 AN INTRUSION DETECTION AND PREVENTION SYSTEM IN CLOUD COMPUTING: A TECHNICAL REVIEW Bharath Reddy S., Malathi D. and Shijoe Jose Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: [email protected] ABSTRACT Information security is one of the crucial issues in data transmission through Cloud Environment. Cloud environment are extremely exposed to security attacks and consign a great challenge today. This paper overviews looks at and advise scientists about the most recent created IDPSs and caution administration techniques by executing an entire scientific classification and surveying conceivable answers for identify and forestall interruptions in distributed computing frameworks.The study of these examination works is limited in view of the gave scientific classification which was portrayed in the paper. Distributed computing is just as of late embracing around the world; in this manner, there are not very many handy and exploratory interruption location frameworks prevail in this present reality. Notwithstanding every one of the fringes and restrictions of the momentum cutting edge, this exploration study depends on what criteria and necessities ought to an IDPS fulfill to be sent on distributed computing situations and which strategies or methods can meet these requests. Keywords: anomaly based detection, hybrid based detection, intrusion detection and prevention Systems (IDPS), and signature based detection. INTRODUCTION In the course of the most recent decade, our general public has turn innovation subordinate. Individuals depend on PC systems to acquire news, stock costs, email, and internet shopping. The honor and accessibility of every one of these frameworks should be secure against a few dangers. Capable programmers, match organizations, psychological oppressors and even outside governments have the intention and ability to do advanced assaults against PC frameworks. In this manner, the field of data security has turned out to be genuinely basic to the wellbeing and financial prosperity of society all in all. Frameworks, Internet, Web application, conveyed registering nearby different occasions of overall mental persecution, manufactures the necessity for executing safe and sound and security systems inside the utilization of firewalls, interference acknowledgment and abhorrence structures, encryption, check and other hard-item and programming game plans. In this work to secure our set away information and the frameworks, IDPS can decide to be a profitable apparatus, where it will likely accomplish early recognizable proof of noxious action and conceivably square more extreme harm to the ensured frameworks. By utilizing IDPS, one can conceivably distinguish an assault and educate suitable faculty rapidly or keep it from succeeding, so that the threatening can be limited. IDPS can in like manner be an uncommonly material device for recording measurable information that might be utilized as a part of legal procedures if the culprit of a criminal rupture is indicted. IDPS execution is postponed by the elevated false ready rate it produces. This is a grave stress in information security in light of the reality that any false alerts will onset an extreme effect on the framework, for example, the interruption of information accessibility in view of IDPS blockage in guess the data to be an assault endeavor. Incessant interruptions There are a few incessant interruptions influencing accessibility, secrecy, and respectability of Cloud assets and administrations. Insider attack Supported Cloud clients possibly will push to get (and use wrongly) unapproved benefits. Insiders may perform cheats and reveal estimations to others (or change data deliberately). This addresses a veritable sureness issue. For instance, an inside DoS strike avow aligned with the Amazon Elastic Compute Cloud (EC2)[1]. Flooding attack In this strike, the assailants try to surge difficulty by conveyance a tremendous number of gatherings from a guiltless host (zombie) in the system. Packs can be of sort TCP, ICMP, UDP or a blend of them. This sort of trap might be achievable because of unlawful system affiliations. For a circumstance of Cloud, the requesting for VMs are open by anyone through the Internet, which may achieve DoS (orDDoS)[2] assault by means of zombies. The flooding assault influences the administration's acquired by approved client. By assaulting a solitary server giving an individual administration, an assailant can bring about lost open door for the proposed benefit. Such an assault is called coordinate DoSassault[3]. On the off chance that the server's equipment resources are totally depleted by handling the surge asks for, the diverse administration cases on the related equipment machine are no more extended ready to finish their expected undertakings. Such kind of assault is called aberrant DoS assault.
Transcript
Page 1: AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: bharathreddy.s@ktr.srmuniv.ac.in

VOL. 12, NO. 12, JUNE 2017 ISSN 1819-6608

ARPN Journal of Engineering and Applied Sciences

©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved.

www.arpnjournals.com

3723

AN INTRUSION DETECTION AND PREVENTION SYSTEM IN CLOUD COMPUTING: A TECHNICAL REVIEW

Bharath Reddy S., Malathi D. and Shijoe Jose

Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: [email protected]

ABSTRACT

Information security is one of the crucial issues in data transmission through Cloud Environment. Cloud environment are extremely exposed to security attacks and consign a great challenge today. This paper overviews looks at and advise scientists about the most recent created IDPSs and caution administration techniques by executing an entire scientific classification and surveying conceivable answers for identify and forestall interruptions in distributed computing frameworks.The study of these examination works is limited in view of the gave scientific classification which was portrayed in the paper. Distributed computing is just as of late embracing around the world; in this manner, there are not very many handy and exploratory interruption location frameworks prevail in this present reality. Notwithstanding every one of the fringes and restrictions of the momentum cutting edge, this exploration study depends on what criteria and necessities ought to an IDPS fulfill to be sent on distributed computing situations and which strategies or methods can meet these requests. Keywords: anomaly based detection, hybrid based detection, intrusion detection and prevention Systems (IDPS), and signature based detection. INTRODUCTION

In the course of the most recent decade, our general public has turn innovation subordinate. Individuals depend on PC systems to acquire news, stock costs, email, and internet shopping. The honor and accessibility of every one of these frameworks should be secure against a few dangers. Capable programmers, match organizations, psychological oppressors and even outside governments have the intention and ability to do advanced assaults against PC frameworks. In this manner, the field of data security has turned out to be genuinely basic to the wellbeing and financial prosperity of society all in all. Frameworks, Internet, Web application, conveyed registering nearby different occasions of overall mental persecution, manufactures the necessity for executing safe and sound and security systems inside the utilization of firewalls, interference acknowledgment and abhorrence structures, encryption, check and other hard-item and programming game plans.

In this work to secure our set away information and the frameworks, IDPS can decide to be a profitable apparatus, where it will likely accomplish early recognizable proof of noxious action and conceivably square more extreme harm to the ensured frameworks. By utilizing IDPS, one can conceivably distinguish an assault and educate suitable faculty rapidly or keep it from succeeding, so that the threatening can be limited. IDPS can in like manner be an uncommonly material device for recording measurable information that might be utilized as a part of legal procedures if the culprit of a criminal rupture is indicted.

IDPS execution is postponed by the elevated false ready rate it produces. This is a grave stress in information security in light of the reality that any false alerts will onset an extreme effect on the framework, for example, the interruption of information accessibility in view of IDPS blockage in guess the data to be an assault

endeavor. Incessant interruptions

There are a few incessant interruptions influencing accessibility, secrecy, and respectability of Cloud assets and administrations. Insider attack

Supported Cloud clients possibly will push to get (and use wrongly) unapproved benefits. Insiders may perform cheats and reveal estimations to others (or change data deliberately). This addresses a veritable sureness issue. For instance, an inside DoS strike avow aligned with the Amazon Elastic Compute Cloud (EC2)[1].

Flooding attack

In this strike, the assailants try to surge difficulty by conveyance a tremendous number of gatherings from a guiltless host (zombie) in the system. Packs can be of sort TCP, ICMP, UDP or a blend of them. This sort of trap might be achievable because of unlawful system affiliations.

For a circumstance of Cloud, the requesting for VMs are open by anyone through the Internet, which may achieve DoS (orDDoS)[2] assault by means of zombies. The flooding assault influences the administration's acquired by approved client. By assaulting a solitary server giving an individual administration, an assailant can bring about lost open door for the proposed benefit. Such an assault is called coordinate DoSassault[3]. On the off chance that the server's equipment resources are totally depleted by handling the surge asks for, the diverse administration cases on the related equipment machine are no more extended ready to finish their expected undertakings. Such kind of assault is called aberrant DoS assault.

Page 2: AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: bharathreddy.s@ktr.srmuniv.ac.in

VOL. 12, NO. 12, JUNE 2017 ISSN 1819-6608

ARPN Journal of Engineering and Applied Sciences

©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved.

www.arpnjournals.com

3724

The flooding assault may raise the utilization charges to a great degree as the Cloud would not have the capacity to separate between the ordinary use and fake use.

Port scanning

Port checking[4] gives a quick overview of open ports, close ports, and sifted ports. Through port filtering, aggressors can get open ports and strike associations running on these ports. Compose related particulars, for example, IP address, MAC address, switch, entryway secluding, firewall principles, and so on can be seen through this assault. Unmistakable port taking a gander at systems are TCP checking, UDP isolating, SYN filtering, FIN isolating, ACK checking, Window investigating and so forth[5]. In Cloud situation, an aggressor can strike offered benefits through port checking (by finding open ports whereupon these associations are given).

Backdoor channel attacks

It is an inactive assault which gifts programmer to increase secluded access to the tainted hub to trade off client secrecy. Utilizing secondary passage channels[6] , the programmer can control casualty's assets and can make it as a zombie to offer DDoS assault. It can likewise be connected to uncover the classified information of casualty. Because of this, the bargained framework confronts trouble in working its normal undertakings

Firewall (in Cloud) could be the ordinary clarification to keep a portion of the assaults noted previously. To stay away from ambushes on VM/Hypervisor, inconsistency based interference area systems can be related. For flooding strike and discretionary passage channel assault, moreover signature based impedance conspicuous confirmation or anomaly based interruption territory technique can be second-hand.

Firewalls: Regular solution to intrusions

A firewall secures the front get to motivations behind the structure and is managed as the key line of boundary. Firewalls are used to allow or reject traditions, IP addresses or ports. It involves moving toward movement as demonstrated by the predefined course of action. Fundamental firewall establishment is appeared in Figure-1, where it is introduced at the section purpose of servers.

In Table-1, we pack unmistakable firewalls used as a part of the framework for security reason. As firewalls perceive the framework bundles at the horizon of a framework, insider strikes can't be involvement by standard firewalls. Couple of DoS or DDoS ambushes are moreover too much tangled, making it difficult to perceive via established firewalls. For occurrence, if there is an attack on port 80 (web advantage), firewalls can't perceive incredible action from DoS strike development.

Figure-1. Basic firewall installation.

Table-1. Summary of firewalls.

ASSORTED TYPES OF IDS/IPS WORN IN CLOUD COMPUTING

There are basically four sorts of IDS utilized as a part of Cloud: Host-based interruption location framework (HIDS), Network-based interruption discovery framework (NIDS), Hypervisor based interruption recognition framework and Distributed interruption identification framework (DIDS).

Page 3: AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: bharathreddy.s@ktr.srmuniv.ac.in

VOL. 12, NO. 12, JUNE 2017 ISSN 1819-6608

ARPN Journal of Engineering and Applied Sciences

©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved.

www.arpnjournals.com

3725

Host-based intrusion detection systems (HIDS) HIDS screens and detaches the information

accumulated from a particular host machine. HIDS sees check for the machine by get-together data, for example, record framework utilized, structure calls, coordinate occasions, and so on. HIDS watches alteration in host bit, have report structure and direct of the program. Unending supply of variation from expected direct, it information the vicinity of the strike. The most extreme of HIDS depends on upon picked framework qualities to screen. Each HIDS recognizes impedance for the machines in which it is set as appeared in Figure-2.

Figure-2. Host based intrusion detection system (HIDS).

On Cloud taking care of, HIDS can be put on a host machine, VM or hypervisor to see barging in conduct through checking and data. On the off chance that exhibited on VM, HIDS ought to be seen by Cloud client while for a situation of displaying it on Hypervisor; Cloud supplier need to screen it[7].

HIDS based planning for Cloud environment is projected by[8]. In this building, every focal point of Cloud/Grid contain IDS which gives participation between association obtainable (e.g. IaaS), IDS association and cutoff advantage. As appeared in Figure 3, IDS association is made out of two segments: Analyzer and Alert System.

The occasion evaluator catches information from a few assets like framework logs. In light of the information got from occasion examiner, the IDS administration is utilized for recognizing interruption by utilizing the conduct based system or learning based method. The learning based strategy is utilized to distinguish known assaults, while the conduct based procedure is connected to recognize obscure assaults.

Figure-3 IDS architecture for Grid/Cloud environment At the point when any assault or interruption is detected, the ready framework advises different hubs. In this way, this strategy is proficient notwithstanding to detect obscure assaults by applying feedforward ANN.

Network-based intrusion detection system (NIDS) NIDS screens arrange movement to recognize

malignant action, for example, DoS assaults, port outputs or even endeavors to break into PCs. The data gathered from a system is contrasted and known assaults for interruption discovery. NIDS has more grounded discovery component to identify organize gatecrashers by contrasting current conduct and as of now watched conduct progressively. NIDS has greatly compelled clarity inside the host machines. On the off chance that the system movement is encoded, there is no compelling route for the NIDS to decode the activity for investigation.

In[9] reviewed about the security arrangements that can apply to recognize ARP satirizing assaults through trials and usage. They inferred that XArp 2 apparatus is a productive accessible security arrangement that can impeccably distinguish ARP ridiculing assaults among different devices. By going along with it to ARP ask for tempest and ARP checking location instrument, its execution can be made strides. Figure-4 speaks to situating of NIDS in a run of the mill coordinate with the plan to coordinate the movement through the NIDS. NIDS put connecting the firewall and unmistakable hosts of the system.

Figure-3. Network based intrusion detection system.

VM perfect IDS engineering projected in[10] is appeared in Figure-5. There are primarily two parts connected in this approach: IDS administration unit and IDS sensor.

IDS association unit contains occasion information base, occasion gatherer, examination part and remote controller. Occasion gatherer amasses malicious lead saw by IDS sensor and stores in the occasion database. Occasion database stores data concerning got occasions. Examination part (composed by clients) gets the chance to occasion database and separate occasions.

Page 4: AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: bharathreddy.s@ktr.srmuniv.ac.in

VOL. 12, NO. 12, JUNE 2017 ISSN 1819-6608

ARPN Journal of Engineering and Applied Sciences

©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved.

www.arpnjournals.com

3726

Figure-4. Architecture of VM integrated IDS management.

Distributed intrusion detection system (DIDS)

A Distributed IDS (DIDS) contains various IDS (e.g. HIDS, NIDS, and so on.) over an unending structure, all of which interface with each other, or with a focal server that licenses form viewing. The impedance territory parts get the structure data and change over it into a systematized shape to be passed to the focal analyzer. The blend of variety from the standard and stamp based ID systems are utilized for the examination reason. DIDS can be utilized for seeing known and cloud ambushes since it takes focal reasons for both the NIDS and HIDS[11]. Figure-6, demonstrates the working of DIDS.

Figure-5. Distributed intrusion detection system (DIDS).

In agreeable operator based approach[12], individual NIDS module is sent in every Cloud district as appeared. In the event that any Cloud locale recognizes interruptions, it alarms another district. Every ID sends the alarm to each other, to judge the seriousness of this caution. On the off chance that the new assault is recognized, the new blocking guideline is added to piece list. In this way, this kind of recognition and counteractive action opposes assaults in Cloud.

Hypervisor-based intrusion detection system VM attentiveness based IDS[13] is one of the

instances of hypervisor based interference area structure. Hypervisor based IDS is one of the basic frameworks, especially in Cloud enrolling, to recognize intrusion in the virtual environment.

Virtual machine reflection based IDS (VMI-IDS) engineering is appeared in Figure-7[13]. VMI-IDS is not the same as customary HIDS since it specifically watches equipment states, occasions and programming conditions of a host and offers the more intense viewpoint of the structure than HIDS. Virtual machine screen (VMM) is accountable for hardware virtualization besides offers isolation, watching and intercession properties. VMI-IDS have more conspicuous access to the VMM than the code running in checked VM.

Figure-6. VMI-based IDS architecture. Intrusion prevention system (IPS)

IPS screens organize movement and framework exercises to identify conceivable interruptions (With the assistance of IDS) and progressively responds to interruptions for obstructing the activity or isolate it.

IPS ought to be designed precisely for expected results; other-wise it stops the stream of bundles bringing about system inaccessibility. For interruption counteractive action, for the most part firewall with IDS is utilized which incorporates signature indicating system movement rules. In light of the preconfigured rules, IPS figures out if arrange movement ought to be passed or blocked.

In[14] proposed proficient systems based interruption identification and counteractive action approach, which does not necessitate introducing IDS on each hub. This advance works trust issue and exchanging ready message issue. It has less transparency and no false caution rate. In[15] projected Cumulative Sum based Intrusion Prevention System (CSIPS) for anticipating DDoS or DoS assaults. In this work, creators utilized bundle grouping calculation and three recognition calculations (to be specific outbound, inbound, and sent) which helpfully distinguish DDoS assault and launch their logs to secluded IPS machine.

IPSs are fundamentally characterized into two classifications: Host-based IPS (HIPS) and Network-based

Page 5: AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: bharathreddy.s@ktr.srmuniv.ac.in

VOL. 12, NO. 12, JUNE 2017 ISSN 1819-6608

ARPN Journal of Engineering and Applied Sciences

©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved.

www.arpnjournals.com

3727

IPS (NIPS). The conceivable situating of IPS in a normal system is appeared in Figure-8.

Figure-7. Network based intrusion prevention system.

Intrusion detection and prevention systems in cloud computing

Albeit appropriated IDPSs have been surveyed to be fit for ensuring safely in expansive scale systems, yet usage and arrangement in distributed computing challenges numerous troubles is still a testing errand[16].

Table-2. Summary of IDS/IPS types.

The assortment of cloud administrations clients and the unpredictability of its design drive to various

prerequisites and potential outcomes for being secured by IDPS. Notwithstanding security issues produced by its one

Page 6: AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: bharathreddy.s@ktr.srmuniv.ac.in

VOL. 12, NO. 12, JUNE 2017 ISSN 1819-6608

ARPN Journal of Engineering and Applied Sciences

©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved.

www.arpnjournals.com

3728

of a kind elements and design, distributed computing acquires all the current frameworks and systems' security issues.

To address the necessities of IDPS for distributed computing. To start with, we take a gander at the particular qualities of distributed computing frameworks and confronting difficulties of IDPS improvement in distributed computing. At that point the as of now created frameworks are explored with respect to their productivity and adequacy to convey on distributed computing environment. At last, the prerequisites are outlined by distributed computing frameworks' qualities and the wanted normal for IDPS. CHARACTERISTICS OF CLOUD COMPUTING SYSTEMS Elasticity

Elasticity is a noteworthy center element for cloud frameworks which limits the hidden foundation ability to oblige to changing prerequisites, for example, sum and size of information utilized as a part of an application. Yet, level versatility signifies the quantity of examples to fulfill changing measures of solicitations. This imagines additional necessities from middleware administration viewpoint, particularly with respect to unwavering quality. Reliability

Reliability is the ability of guaranteeing the continuation of the framework operation without intrusion, for example, loss of information or code reset amid execution. Reliability is typically refined through using excess assets. Nonetheless, a dominant part of the arrangements are programming based, not equipment based. There is a solid relationship amongst accessibility and dependability. Nonetheless, unwavering quality focuses specifically on counteractive action of misfortune (of information or execution advance). Quality of service (QoS)

The quality of Service (QoS) support is crucially imperative for particular necessities which ought to be met through the given administrations or assets. To guarantee that the obtained benefit nature of the cloud client in Service Level Agreement (SLA) is met the essential measurements of QoS, for example, security, reaction time and throughput must be ensured. Dependability is a part of QoS. Agility and adaptability

Agility and adaptability are two key purposes of incredible worry to cloud frameworks identified with the flexible capacities. They allude to on-time response to varieties in the extent of assets and the measure of solicitations and additionally adjustment to changes as indicated by the states of the earth. This selection may require diverse sorts of assets, distinctive courses or even

unique qualities. In outline, adaptability and agility need organization of the resources to be autonomic.

In rundown, it can be inferred that the present frameworks are not equipped for conveying on distributed computing situations which have their particular embodiment and prerequisites. There is no customary IDPS to meet these attributes proficiently. CHALLENGES OF IDPS DEVELOPMENT IN CLOUD COMPUTING ENVIRONMENTS

It is vital to distinguish the troubles which are started from distributed computing marvels before building up an IDPS. The particular troubles that engineers confront amid creating IDPS for distributed computing situations include: In conventional IDPS, because of the static

quintessence of the observed frameworks, the arrangements psyches to be static since the hub bunches have relentless necessities which have been distinguished after some time. Interestingly with the customary mode, the checked virtual machines are progressively evacuated and included. Also, the security prerequisites of each virtual machine have a tendency to be fluctuated[17].

The security approaches are normally settled and oversaw by a framework head in charge of the security of the entire framework. Cloud has different framework security overseers; this postures negative impacts on interruption reaction time. The human intercession would back off the reaction time.

Engaging in the vindictive action of an insider is rapidly available by joining an aggressor to a cloud benefit supplier. In the interim, the present day investigates have given confirmation that the vast majority of the gatecrashers originate from insiders[18]. The majority of the accessible ways to deal with taking care of this issue are for the most part on checking worker exercises and plan of cloud suppliers' arrangement.

A intense issue in distributed computing is information exchange cost[20]. For instance, in Amazon Cloud, the information exchange cost is about at $100 to $150 per terabyte. In this way, new inquires about ought to attempt to execute information financially savvy answers for IDPS in the cloud environment with diminishing the system data transfer capacity.

Additional issues concern perceivability into the between virtual machine movement on a virtual host stage, since the switch is additionally virtualized. In this way, customary answers for physical checking are not ready to analyze this system activity[21]. Additionally, the new stages of virtualization themselves would have vulnerabilities that may prompt to enormous trade off. In this way they ought to be checked and evaluated for setup blunders, fixes etc.

Page 7: AN INTRUSION DETECTION AND PREVENTION SYSTEM IN … · 2017-06-25 · Department of Computer Science and Engineering, SRM University, Chennai, India E-Mail: bharathreddy.s@ktr.srmuniv.ac.in

VOL. 12, NO. 12, JUNE 2017 ISSN 1819-6608

ARPN Journal of Engineering and Applied Sciences

©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved.

www.arpnjournals.com

3729

CONCLUSIONS We mentioned about a few obstructions which can

danger uprightness, secret, and accessibility of Cloud associations. Firewall just may not be adequate to grasp Cloud security issues. This paper underlined the utilization of decision choices to join interruption divulgence and obstruction evading systems into Cloud and investigated goes in Cloud where IDS/IPS can be orchestrated practical recognizing evidence and adjusting movement. Late research disclosures joining IDS/IPS in Cloud have been talked about with their focal concentrations and weights. Particular believed was given to cloud structures qualities and current difficulties banning IDPS change for the cloud. An outline of necessities for a cloud-based impedance territory and killing action framework was given. REFERENCES [1] Slaviero M, Black H at presentation demovids:Amazon,

/http://www.sensepost. com/blog/3797.htmlS; 2009.

[2] R. Megiba Jasmine, G. M. Nishibha, “Public Cloud Secure Group Sharing and Accessing in Cloud Computing”, Indian Journal of Science and Technology,2015 July, 8(15), Doi no:10.17485/ijst/2015/v8i15/75177.

[3] https://www.snort.org;2011.

[4] Stiawan D, Abdullah, AH, Idris, MY. The trends of intrusion prevention system network. In: Second international conference on education technology and computer (ICETC) 4; 2010: 217–21.

[5] Roschke S, Feng C, Meinel C. An extensible and

virtualization compatible IDS management architecture. In: Fifth international conference on information assurance and security, 2; 2009: pp. 130–4.

[6] Dutkevyach T, Piskozub A, Tymoshyk, N. Real-time intrusion prevention and anomaly analyze system for corporate networks. In: Fourth IEEE workshop on intelligent data acquisition and advanced computing systems: technology and applications, 2007. IDAACS 2007: 2007: pp. 599–602.

[7] Cox P. Intrusion detection in a cloud computing environment./http://searchcloud computing.techtarget.com/tip/Intrusion-detection-in-a-cloud-computing-environment; 2011.

[8] Vieira K, Schulter A, Westphall C, Westphall C. Intrusion detection techniques in grid and cloud computing environment. IEEE IT Professional Magazine 2010.

[9] Hemairy MA, Amin S, Trabelsi Z. Towards more sophisticated ARP Spoofing detection/prevention systems in LAN networks. In: International conference on the current trends in information technology (CTIT); 2009: pp. 1–6.

[10] Roschke S, Feng C, Meinel C. An extensible and

virtualization compatible IDS management architecture. In: Fifth international conference on information assurance and security, 2; 2009: pp. 130–4.

[11] Sandar SV, Shenai S. Economic denial of sustainability (EDoS) in cloud services using HTTP and XML based DDoS attacks. International Journal of Computer Applications 2012;41(20):11–6.

[12] Lo CC, Huang CC, Ku J. Cooperative Intrusion detection system framework for cloud computing networks. In: First IEEE International Conference on UbiMedia Computing; 2008: pp. 280–4.

[13] Ram S. Secure cloud computing based on mutual intrusion detection system. International journal of computer application 2012;2(1):57–67.

[14] Ahmed M.,Pal,R.,Hossain,H.M., Bikas, M. ,Hasan, M.K.,NIDS: A Network Based Approach to Intrusion Detection and Prevention, Computer Science and Information Technology—Spring Conference;2009:pp.141–4.

[15] Leu FY, Li ZY. Detecting DoS and DDoS attack using an intrusion detection and remote prevention system. Fifth International Conference on Information Assurance and Security 2009;2:251–4.

[16] Roschke S, F Cheng, and C Meinel, ‘‘Intrusion detection in the Cloud,’’ presented at the Eighth IEEE international conference on dependable, autonomic and secure computing, pp. 729–34, 2009.

[17] Aboosaleh Mohammad Sharifi, Saeed K. Amirgholipour, Mehdi Alirezanejad, Baharak Shakeri Aski, Mohammad Ghiami, “Availability Challenge of Cloud System under DDOSAttack”,Indian Journal of Science and Technology,2012 June, 5(6), Doi no: 10.17485/ijst/2012/v5i6/30488

[18] Kizza JM. System intrusion detection and prevention. In: KizzaJM, editor. A Guide to Computer Network Security. London: Springer; 2009. p. 273–98.

[19] Grobauer B, Walloschek T, Stocker E. Understanding cloud computing vulnerabilities. Security & Privacy, IEEE 2011;9:50–7.

[20] Dastjerdi AV, KABakar ,and Sghtabatabaei, ‘‘Distributed intrusion detection in clouds using mobile agents, ’’ in Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema.pp.175–180, 2009.

[21] Viega J. Cloud computing and the common man. Computer 2009; 42:106–8.


Recommended