Skip to main content

Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment

  • Conference paper
Advances in Computer Science, Engineering & Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AINSC,volume 167))

Abstract

Grid Computing is information technology which used to share resources across the global to solve the large scale problem. It is based on networks to enable large scale aggregation and sharing of computational, data, sensors and other resources across global. Grid Computing Environment provides the services like Job Executing Environment and web services as well. So Grid Computing Environment should be secured from the outside and inside intruder. Grid Computing is a Global Infrastructure on the internet has led to a security attacks on the Computing Infrastructure. The wide varieties of IDS (Intrusion Detection System) are available which are designed to handle the specific types of attacks. No technique can give QoS along with IDS. So this paper proposes a Mobile Agent-based Intrusion Detection System (MA-IDS) architecture, is a secured architecture to provide the security, maximizing the user’s benefits and Quality of Service (QoS). The Most Benefit Travelling Salesman Problem (MBTSP) is introduced to describe how the Agent acts in this model by using optimized routing algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, J., Zhang, G.-y., Gu, G.-c.: A Multi-agent Based Architecture for Network Attack Resistant System. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003, Part I. LNCS, vol. 3032, pp. 980–983. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Wang, Y., Yang, H., Wang, X., Zhang, R.: Distributed Intrusion Detection System Basedon Data Fusion Method. In: Proceedings of the 6th World Congress on Intelligent Control and Automation (2004)

    Google Scholar 

  3. Leu, F.Y., Lin, J.C., Li, M.C., Yang, C.T.: A Performance-Based Grid Intrusion Detection System. In: Proc. of IEEE Annual International Computer Software and Applications Conf., pp. 525–530 (July 2005)

    Google Scholar 

  4. Park, K., Lee, H.: On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In: Proc. ACM SIGCOMM, pp. 15–26 (August 2001)

    Google Scholar 

  5. Jin, L., Tong, W.Q., Tang, J.Q., Wang, B.: A Fault-Tolerant Mechanism in Grid. In: Proc of IEEE International Conference on Industrial Informatics, pp. 457–461 (August 2003)

    Google Scholar 

  6. Sebring, M.M., Shellhouse, E., Hanna, M.E., Whitehurst, R.A.: Expert Systems in Intrusion Detection: A Case Study. In: Proceedings of the Eleventh National Computer Securtiy Conference, Washington, D.C. (October 1988)

    Google Scholar 

  7. Snapp, S.R., et al.: DIDS (Distributed Intrusion Detection System) – Motivation, Architecture, and An Early Prototype. In: Proceedings of the Fifteenth National Computer Security Conference, Baltimore, MD (October 1992)

    Google Scholar 

  8. Wan, K.K., Chang, R.: Engineering of a Global Defense Infrastructure for DDoS Attacks. In: Proc. IEEE Int’l. Conf. Net. (August 2002)

    Google Scholar 

  9. Kodada, B.B., Prasad, M.: Security Architecture for Building IDS in the Service Grid Environment. International Journal of Computer Science issues (accepted, 2012)

    Google Scholar 

  10. Gao, Z., Luo, S., Ding, D.: A Service Scheduling Model in the Service Grid Environment. In: The Sixth International Conference on Grid and Cooperative Computing (GCC 2007). IEEE Computer Society (2007) 0-7695-2871-6/07

    Google Scholar 

  11. Kodada, B.B., Nayak, R., et al.: Intrusion Detection System – Inside Grid Computing Environment (IDS-IGCE). (IJGCA) International Journal of Grid Computing and Application (2011)

    Google Scholar 

  12. Vazhkudai, S., Schopf, J.M.: Predicting sporadic grid data transfers. In: Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing (HPDC 2002) (2002)

    Google Scholar 

  13. Nudd, G.R., Kerbyson, D.J., Papaefstathiou, E., Perry, J.S.C., Wilcox, D.V.: Pace — a toolset for the performance prediction of parallel and distributed systems. Int. J. High Performance Computing Applications, Special Issues on Performance Modelling 14(3), 228–251 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raghavendra Prabhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Prabhu, R., Kodada, B.B., Shivakumar, K.M. (2012). Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_97

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30111-7_97

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30110-0

  • Online ISBN: 978-3-642-30111-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics