Abstract
The Cloud security is one of the major obstacles to the adoption of cloud computing services. It requires some solutions such as Intrusion Detection Systems (IDSs) for protecting each user against all malicious. Existing IDS because of lower detection rate and higher false positive rate couldn’t be suitable for a distributed environment such as the cloud. To tackle this problem, we propose a new distributed intrusion detection system based on a multi-agent system to identify and prevent known and unknown attacks in this environment. Carried out experiments demonstrated the performance and efficiency of our proposed system integrated with multi-agent technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ramachandran, M., Chang, V.: Towards performance evaluation of cloud service providers for cloud data security. Int. J. Inf. Manag. 36(4), 618–625 (2016)
Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology, vol. 145, p. 7. NIST Special Publication (2011)
Achbarou, O., El kiram, M.A., El Bouanani, S.: Securing cloud computing from different attacks using intrusion detection systems. Int. J. Interact. Multimed. Artif. Intell. 4(3), 61 (2017)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Singh, S., Jeong, Y.S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200–222 (2016)
Achbarou, O., El Kiram, M.A., Elbouanani, S.: Cloud security: a multi agent approach based intrusion detection system. Ind. J. Sci. Technol. 10(18) (2017)
Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36(1), 25–41 (2013)
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36, 16–24 (2012)
Keegan, N., Ji, S.-Y., Chaudhary, A., Concolato, C., Yu, B., Jeong, D.H.: A survey of cloud-based network intrusion detection analysis. Hum.-Cent. Comput. Inf. Sci. 6(1), 19 (2016)
Cavalcante, R.C., Bittencourt, I.I., Da Silva, A.P., Silva, M., Costa, E., Santos, R.: A survey of security in multi-agent systems. Expert Syst. Appl. 39(5), 4835–4846 (2012)
Baig, Z.A.: Multi-agent systems for protecting critical infrastructures: a survey. J. Netw. Comput. Appl. 35(3), 1151–1161 (2012)
Venkataramana, K., Padmavathamma, M.: Multi-agent intrusion detection and prevention system for cloud environment. Int. J. Comput. Appl. 49(20), 24–29 (2012)
Hada, P.S., Singh, R., Manmohan Meghwal, M.: Security agents: a mobile agent-based trust model for cloud computing. Int. J. Comput. Appl. 36(12), 975–8887 (2011)
Saadi, C., Chaoui, H.: Cloud computing security using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb. Proc. Comput. Sci. 85, 433–442 (2016)
Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29(4), 713–722 (2005)
Wang, H., Zhou, H., Wang, C.: Virtual machine-based intrusion detection system framework in cloud computing environment. J. Comput. 7(10), 2397–2403 (2012)
Idrissi, H., Ennahbaoui, M., Souidi, E.M., El Hajji, S.: Mobile agents with cryptographic traces for intrusion detection in the cloud computing. Proc. Comput. Sci. 73, 179–186 (2015)
Seresht, N.A., Azmi, R.: MAIS-IDS: a distributed intrusion detection system using multi-agent AIS approach. Eng. Appl. Artif. Intell. 35, 286–298 (2014)
Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE: a software framework for developing multi-agent applications. Lessons learned. Inf. Softw. Technol. 50(1–2), 10–21 (2008)
Shinde, P., Parvat, T.J.: DDoS attack analyzer: using JPCAP and WinCap. Proc. Comput. Sci. 79, 781–784 (2016)
Su, C.J.: Mobile multi-agent based, distributed information platform (MADIP) for wide-area e-health monitoring. Comput. Ind. 59(1), 55–68 (2008)
Fortino, G., Garro, A., Russo, W.: Achieving mobile agent systems interoperability through software layering. Inf. Softw. Technol. 50(4), 322–341 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Achbarou, O., El Kiram, M.A., Bourkoukou, O., Elbouanani, S. (2018). A Multi-agent System-Based Distributed Intrusion Detection System for a Cloud Computing. In: Abdelwahed, E., et al. New Trends in Model and Data Engineering. MEDI 2018. Communications in Computer and Information Science, vol 929. Springer, Cham. https://doi.org/10.1007/978-3-030-02852-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-02852-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02851-0
Online ISBN: 978-3-030-02852-7
eBook Packages: Computer ScienceComputer Science (R0)