Analysis of Intrusion Detection System for Cloud Environment  
  Authors : Saurabh P.Taley; J.J.Shah

 

Cloud computing provides large scale computing resource to each customers. Cloud systems can be threatened by numerous attacks as cloud provides services to no trustworthy system. Cloud needs to contain intrusion detection system for protecting system against threads. If IDS is having stronger security using more rules or patterns then it need much more computing resources. Current cloud monitoring systems can rely on signature-based and supervised-learning-based detection methods to check out attacks and anomalies. Propose work introduce UCAD, an Unsupervised Cloud Anomaly Detection for knowledge-independent detection of anomalous traffic. UCAD uses a novel clustering technique based on Partition based clustering to identify clusters and outliers in multiple lowdimensional spaces. The evidence of traffic structure provided by these multiple clustering is then combined to produce an abnormality ranking of traffic flows, using a correlationdistance- based approach.

 

Published In : IJCAT Journal Volume 1, Issue 1

Date of Publication : 28 February 2014

Pages : 09 - 12

Figures : 01

Tables : 01

Publication Link : IJCAT-2014/1-1/Analysis-of-Intrusion-Detection-System-for-Cloud-Environment

 

 

 

Saurabh P.Taley : CSE(ESC-IV Sem) , G.H.Raisoni College of Engineering, Nagpur, Maharastra, India

J.J.Shah : Assistant prof. IT DEPARTMENT, G.H.Raisoni College of Engineering, Nagpur, Maharastra, India

 

 

 

 

 

 

 

Intrusion Detection System

Anomaly detection

Clustering

IDS methods leads to effective resources usages by applying differentiated level of security strength to users based on the degree of anomaly. Through the cloud computing it is possible to judge all users and administrators as potential attacker and apply strong security policy to all traffic, but it is not efficient at all. If any security hazards occur, economic damages are unavoidable. proposed work Unsupervised cloud Anomaly Detection UCAD verified the effectiveness of the system detect real single source-destination and distributed attacks in real traffic all in a completely blind fashion, without assuming any particular traffic model, clustering parameters, or even clusters structure beyond a basic definition of what an anomaly. So it’s effective way of detecting attacks in cloud environment.

 

 

 

 

 

 

 

 

 

[1] Zhen Chen*, Fuye Han, Junwei Cao, Xin Jiang, and Shuo Chen “Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System” TSINGHUA SCIENCE AND TECHNOLOGY ,2013. [2] Kapil Wankhade, Sadia Patka, Ravindra Thool “ An Efficient Approach for Intrusion Detection Using Data Mining Methods” 2013 IEEE [3] En Niari Saad, Khalil El Mahdi, Mostapha Zbakh “Cloud Computing Architectures Based IDS” 2012 IEEE. [4] Amira Bradai and Hossam Afifi “Enforcing Trust-based Intrusion Detection in Cloud Computing Using Algebraic Methods” 2012. [5] mld Khoudali, Karim Benzidane and Abderrahim Sekkaki “Inter-VM packet inspection in Cloud Computing ” The 5th International Conference on Communications, Computers and Appllication 2012. [6] Massimo Ficc o, Massimiliano Rak, and Beniamino Di Martino “An Intrusion Detection Framework for Supporting SLA Assessment in Cloud Computing” 2 0 12 I EEE. [7] Matthias Gander, Basel Katt, Michael Felderer, Adrian Tolbaru, Ruth Breu, Alessandro Moschitti “Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning” 2012. [8] Hisham A.Kholidy,Fabrizio Baiardi “DCDIDP:A Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention Framework for Cloud Computing Environments” 2012 IEEE. [9] Pedro Casas, Johan Mazel and Philippe Owezarski “UNADA: Unsupervised Network Anomaly Detection using Sub-Space Outliers Ranking” 2011. [10] Jun-Ho Lee,Min-Woo Park,Jung-Ho Eom, and Tai- Myoung Chung“Multi-level Intrusion Detection System and Log Management in Cloud Computing” 2011. [11] Jie Yang, Yong Ge, Hui Xiong, Yingying Chen, Hongbo Liu “Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments ” 2010. [12] Manzoor Elahi,Kun Li,Wasif Nisar,Xinjie Lv,Hongan Wang “Detection of Local Outlier Over Dynamic Data Streams using Efficient Partitioning Method” 2009 [13] Baoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin Zhao “Research on Gravity-based Anomaly Intrusion Detection Algorithm” 2009. [14] HU Liang, REN Wei-wu, REN Fei “Anomaly Detection using Improved Hierarchy Clustering” 2009. [15] Yu-Ping Zhou, Jian-An Fang , Yu-Ping Zhou “Research on Neuro-Fuzzy Inference System in Hierarchical Intrusion Detection”2009.