Security solutions in Cloud through customized IDS configuration at VM level

Yakuta Tayyebi, D. Bhilare
{"title":"Security solutions in Cloud through customized IDS configuration at VM level","authors":"Yakuta Tayyebi, D. Bhilare","doi":"10.1109/ICACAT.2018.8933581","DOIUrl":null,"url":null,"abstract":"Security is one of the top concerns in the adoption of Cloud Computing. Due to the distributed architecture, assessed through the internet cloud architecture are exposed to critical network attacks. Intrusion Detection System is used to ensure network security and early detection of possible attacks. When deployed in Cloud architecture, Intrusion Detection System has to confront issues like high amounts of data to be processed due to high network traffic and high false alarm rates due to dynamic nature of cloud. This paper will provide overview of working of IDS and its deployment in cloud. We propose a novel algorithm that works in accordance with the Virtual Machine’s feature and network behavior to select signatures for configuring intrusion detection system at virtual machine level. This system aims at providing high detection accuracy with low false positive rate at affordable computational cost. We will use snort, a signature based detection tool to detect the known attacks. IDS at each instance will be configured with selected signatures in the cloud environment. The system developed is evaluated for IDS accuracy and resources required.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"199 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACAT.2018.8933581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Security is one of the top concerns in the adoption of Cloud Computing. Due to the distributed architecture, assessed through the internet cloud architecture are exposed to critical network attacks. Intrusion Detection System is used to ensure network security and early detection of possible attacks. When deployed in Cloud architecture, Intrusion Detection System has to confront issues like high amounts of data to be processed due to high network traffic and high false alarm rates due to dynamic nature of cloud. This paper will provide overview of working of IDS and its deployment in cloud. We propose a novel algorithm that works in accordance with the Virtual Machine’s feature and network behavior to select signatures for configuring intrusion detection system at virtual machine level. This system aims at providing high detection accuracy with low false positive rate at affordable computational cost. We will use snort, a signature based detection tool to detect the known attacks. IDS at each instance will be configured with selected signatures in the cloud environment. The system developed is evaluated for IDS accuracy and resources required.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云中的安全解决方案,通过在虚拟机级别定制IDS配置
安全性是采用云计算的首要问题之一。由于采用分布式架构,通过互联网云架构进行评估,容易受到关键的网络攻击。入侵检测系统用于保证网络安全,及早发现可能发生的攻击。在云架构中部署入侵检测系统时,由于网络流量大,需要处理大量的数据,由于云的动态性,需要处理高虚警率等问题。本文将概述IDS的工作原理及其在云环境中的部署。本文提出了一种新的算法,根据虚拟机的特征和网络行为选择虚拟机级入侵检测系统的签名。该系统旨在以低廉的计算成本提供高检测精度和低误报率。我们将使用snort,一种基于签名的检测工具来检测已知的攻击。每个实例中的IDS都将使用云环境中的选定签名进行配置。对开发的系统进行了IDS精度和所需资源的评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Metaphoric Investigation on Prediction of Heart Disease using Machine Learning Dynamic Weight Ranking algorithm using R-F score for Efficient Caching VLSI Architecture for Low Cost and Power Reversible Arithmetic Logic Unit based on Reversible Gate Advance Malware Analysis Using Static and Dynamic Methodology Evaluate Performance of student by using Normalized data set, Fuzzy and A-priori Like Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1