Multi-level Intrusion detection system in cloud environment based on trust level

Z. Salek, F. M. Madani
{"title":"Multi-level Intrusion detection system in cloud environment based on trust level","authors":"Z. Salek, F. M. Madani","doi":"10.1109/ICCKE.2016.7802122","DOIUrl":null,"url":null,"abstract":"Cloud computing is a new way to address a wide range of resource needs. Cloud environment provides a framework for dynamic and saleable use of services. It provides access to computing and data storage resources on a pay per usage model. Although there are many known advantages for cloud, security is still one of its most challenging issues. Intrusion detection systems are a common security tool which can also be used in cloud environment to increase the level of security. But conventional intrusion detection systems are not able to fully handle the features of the cloud, such as highly distributed or the variety of services. Also there are differences in security needs for each service or user of different cloud service providers. In this study we proposed a multi-level architecture for intrusion detection system based on different levels of risk level identified for each user. User's risk level can be defined through the computed trust level; as risk level can be reveres of trust level for each user. With identified trust level, users are categorized in to three groups of “High risk”, “Medium risk” and “Low risk”. After the risk levels are identified and users are assigned to a security group, pre-configured IDS agent is assigned to user's virtual machine. IDS are configured in three types of HIDS, MIDS and LIDS in proportion to the security groups described before. These three types of IDS agents vary in number of rules in their rule set, and configuration of rules in each level. A higher level agent for each type of IDS controls the performance and updates rule sets. There is a global agent which collects alert logs to analyze them for detecting correlation in alerts. This architecture improves resource usage, time and packet drop without a tangible impact on accuracy.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE.2016.7802122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Cloud computing is a new way to address a wide range of resource needs. Cloud environment provides a framework for dynamic and saleable use of services. It provides access to computing and data storage resources on a pay per usage model. Although there are many known advantages for cloud, security is still one of its most challenging issues. Intrusion detection systems are a common security tool which can also be used in cloud environment to increase the level of security. But conventional intrusion detection systems are not able to fully handle the features of the cloud, such as highly distributed or the variety of services. Also there are differences in security needs for each service or user of different cloud service providers. In this study we proposed a multi-level architecture for intrusion detection system based on different levels of risk level identified for each user. User's risk level can be defined through the computed trust level; as risk level can be reveres of trust level for each user. With identified trust level, users are categorized in to three groups of “High risk”, “Medium risk” and “Low risk”. After the risk levels are identified and users are assigned to a security group, pre-configured IDS agent is assigned to user's virtual machine. IDS are configured in three types of HIDS, MIDS and LIDS in proportion to the security groups described before. These three types of IDS agents vary in number of rules in their rule set, and configuration of rules in each level. A higher level agent for each type of IDS controls the performance and updates rule sets. There is a global agent which collects alert logs to analyze them for detecting correlation in alerts. This architecture improves resource usage, time and packet drop without a tangible impact on accuracy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云环境下基于信任级别的多级入侵检测系统
云计算是一种解决各种资源需求的新方法。云环境为服务的动态和可销售的使用提供了一个框架。它以按次付费的模式提供对计算和数据存储资源的访问。尽管云计算有许多已知的优势,但安全性仍然是其最具挑战性的问题之一。入侵检测系统是一种常见的安全工具,也可以用于云环境中,以提高安全级别。但是传统的入侵检测系统并不能完全处理云的特性,比如高度分布式或各种各样的服务。此外,不同云服务提供商的每个服务或用户的安全需求也存在差异。在本研究中,我们提出了一种基于不同风险等级的入侵检测系统的多级体系结构。通过计算得到的信任等级来定义用户的风险等级;因为风险级别可以是每个用户的信任级别。在确定了信任水平后,将用户分为“高风险”、“中等风险”和“低风险”三组。在确定了风险级别并将用户分配到安全组之后,将预先配置的IDS代理分配给用户的虚拟机。IDS按照前面介绍的安全组的比例配置为HIDS、MIDS和lid三种类型。这三种类型的IDS代理在其规则集中的规则数量和每个级别的规则配置上有所不同。每种IDS的高级代理控制性能并更新规则集。有一个全局代理,它收集警报日志并对其进行分析,以检测警报中的相关性。这种体系结构改善了资源使用、时间和数据包丢弃,而对准确性没有明显的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Modeling SIP normal traffic to detect and prevent SIP-VoIP flooding attacks using fuzzy logic Anomaly and tampering detection of cameras by providing details Automatic graph-based method for classification of retinal vascular bifurcations and crossovers Multi-objective mobile robot path planning based on A* search HFIaaS: A proposed FPGA Infrastructure as a Service framework using High-Level Synthesis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1