Abstract
Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. With the enormous use of Cloud, the probability of occurring intrusion also increases. Intrusion Detection System (IDS) is a stronger strategy to provide security. In this paper, we have proposed an efficient, fast and secure IDS with the collaboration of multi-threaded Network Intrusion Detection System (NIDS) and Host Intrusion Detection System (HIDS). In the existing system, Cloud-IDS capture packets from Network, analyze them and send reports to the Cloud Administrator on the basis of analysis. Analysis of packets is done using K-Nearest Neighbor and Neural Network (KNN-NN) hybrid classifier. For training and testing purpose here we have used NSL-KDD dataset. After getting the report from the Cloud-IDS, Cloud Service Provider (CSP) will generate an alert for the user as well as maintain a loglist for storing the malicious IP addresses. Our proposed model handles large flow of data packets, analyze them and generate reports efficiently integrating anomaly and misuse detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mohata, V.B., Dakhane, D.M., Pardhi, R.L.: Cloud based testing: need of testing in cloud platforms. Int. J. Appl. Innov. Eng. Manage. (IJAIEM) 2, 369–373 (2013)
Mittal, R., Soni, K.: Analysis of cloud computing architectures. Int. J. Adv. Res. Comput. Commun. Eng. 2, 2087–2091 (2013)
Redford, M.: Full virtualization by re-imaging cloud hardware. In: Computing and Convergence Technology (ICCCT), pp. 577–583. IEEE Publisher, Seoul (2012)
Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42–57 (2013)
Gouda, M.G., Liu, A.X.: Structured firewall design. Comput. Netw. 51, 1106–1120 (2007)
Lei-jun, L., Hong, P.: A defense model study based on IDS and firewall linkage. Inf. Sci. Manage. Eng. (ISME) 2, 91–94 (2010)
Karthikeyan, K.R., Indra, A.: Intrusion detection tools and techniques—a survey. Int. J. Comput. Theory Eng. 2, 1793–8201 (2010)
Sonawane, S., Pardeshi, S., Prasad, G.: A survey on intrusion detection techniques. World J. Sci. Technol. 2, 127–133 (2012)
Ghosh, P., Ghosh, R., Dutta, R.: An alternative model of virtualization based intrusion detection system in cloud computing. Int. J. Sci. Technol. Res. 3, 199–203 (2014)
Kholidy, H.A., Baiardi, F.: CIDS: a framework for intrusion detection in cloud system. In: Ninth International Conference on Information Technology—New Generations, pp. 379–385. IEEE Computer Society (2012)
Al-Janabi, S.T.F., Saeed, H.A.: A neural network based anomaly intrusion detection system. In: IEEE Computer Society, pp. 221–226 (2011)
Mazzariello, C., Bifulco, R., Canonico, R.: Integrating a network IDS into an open source computing environment. In: Sixth International Conference on Information Assurance and Security (IAS), pp. 265–270. IEEE Publisher, Atlanta, GA (2010)
Bakshi, A., Yogesh, B.: Securing cloud from DDOS Attacks using Intrusion detection system in virtual machine. In: Second International Conference on Communication Software and Networks, IEEE Computer Society, pp. 260–264 (2010)
Ghali, N.I.: Feature selection for effective anomaly-based intrusion detection. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 9, 285–289 (2009)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD Cup 99 data set. In: Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Application (CISDA). pp. 53–58. IEEE Publisher (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Ghosh, P., Mandal, A.K., Kumar, R. (2015). An Efficient Cloud Network Intrusion Detection System. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2250-7_10
Download citation
DOI: https://doi.org/10.1007/978-81-322-2250-7_10
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2249-1
Online ISBN: 978-81-322-2250-7
eBook Packages: EngineeringEngineering (R0)