A collaborative intrusion detection and Prevention System in Cloud Computing

Mohamed Hassani, A. Lebbat, S. Tallal, Hicham Medromi
{"title":"A collaborative intrusion detection and Prevention System in Cloud Computing","authors":"Mohamed Hassani, A. Lebbat, S. Tallal, Hicham Medromi","doi":"10.1109/AFRCON.2013.6757727","DOIUrl":null,"url":null,"abstract":"Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection of resources. The security of Cloud Computing extends the physical security which securing equipment constituting the Cloud architecture, data security must ensure that the service to the client, and network security which plays an important role in ensuring service and reliable protection against attacks and intrusions. At this level, security systems operating in traditional networks are also used in the new model to strengthen its network security. In this work, we propose a collaborative model consists of the Intrusion Detection and Prevention System functions based distributed IDS and IPS, with the use of a hybrid detection technique for addressing the problems of attacks encountered, specifically distributed attacks such as port scanning attacks and distributed internally established within a Cloud Computing environment by users entitled to access, including the integration of the Signature Apriori Algorithm for generating new attack signatures whose objective is to develop the functioning of our security system to be able to detect and block various types of attacks and intrusions.","PeriodicalId":343678,"journal":{"name":"IEEE Region 8 Conference AFRICON","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Region 8 Conference AFRICON","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AFRCON.2013.6757727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28

Abstract

Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection of resources. The security of Cloud Computing extends the physical security which securing equipment constituting the Cloud architecture, data security must ensure that the service to the client, and network security which plays an important role in ensuring service and reliable protection against attacks and intrusions. At this level, security systems operating in traditional networks are also used in the new model to strengthen its network security. In this work, we propose a collaborative model consists of the Intrusion Detection and Prevention System functions based distributed IDS and IPS, with the use of a hybrid detection technique for addressing the problems of attacks encountered, specifically distributed attacks such as port scanning attacks and distributed internally established within a Cloud Computing environment by users entitled to access, including the integration of the Signature Apriori Algorithm for generating new attack signatures whose objective is to develop the functioning of our security system to be able to detect and block various types of attacks and intrusions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云计算环境下的协同入侵检测与防御系统
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Parametric linear time delay models and stability analysis for action-perception behavior of human subjects Energy solution of Zambia from micro hybric biomass - Solar photovoltaic power plants Optimising energetic porous silicon performance Audio diarization for biodiversity monitoring Distribute fluctuating energy to devices with storage capacity
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1