Skip to main content

An Efficient Cloud Network Intrusion Detection System

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 339))

Abstract

Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. With the enormous use of Cloud, the probability of occurring intrusion also increases. Intrusion Detection System (IDS) is a stronger strategy to provide security. In this paper, we have proposed an efficient, fast and secure IDS with the collaboration of multi-threaded Network Intrusion Detection System (NIDS) and Host Intrusion Detection System (HIDS). In the existing system, Cloud-IDS capture packets from Network, analyze them and send reports to the Cloud Administrator on the basis of analysis. Analysis of packets is done using K-Nearest Neighbor and Neural Network (KNN-NN) hybrid classifier. For training and testing purpose here we have used NSL-KDD dataset. After getting the report from the Cloud-IDS, Cloud Service Provider (CSP) will generate an alert for the user as well as maintain a loglist for storing the malicious IP addresses. Our proposed model handles large flow of data packets, analyze them and generate reports efficiently integrating anomaly and misuse detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohata, V.B., Dakhane, D.M., Pardhi, R.L.: Cloud based testing: need of testing in cloud platforms. Int. J. Appl. Innov. Eng. Manage. (IJAIEM) 2, 369–373 (2013)

    Google Scholar 

  2. Mittal, R., Soni, K.: Analysis of cloud computing architectures. Int. J. Adv. Res. Comput. Commun. Eng. 2, 2087–2091 (2013)

    Google Scholar 

  3. Redford, M.: Full virtualization by re-imaging cloud hardware. In: Computing and Convergence Technology (ICCCT), pp. 577–583. IEEE Publisher, Seoul (2012)

    Google Scholar 

  4. Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42–57 (2013)

    Article  Google Scholar 

  5. Gouda, M.G., Liu, A.X.: Structured firewall design. Comput. Netw. 51, 1106–1120 (2007)

    Article  MATH  Google Scholar 

  6. Lei-jun, L., Hong, P.: A defense model study based on IDS and firewall linkage. Inf. Sci. Manage. Eng. (ISME) 2, 91–94 (2010)

    Google Scholar 

  7. Karthikeyan, K.R., Indra, A.: Intrusion detection tools and techniques—a survey. Int. J. Comput. Theory Eng. 2, 1793–8201 (2010)

    Google Scholar 

  8. Sonawane, S., Pardeshi, S., Prasad, G.: A survey on intrusion detection techniques. World J. Sci. Technol. 2, 127–133 (2012)

    Google Scholar 

  9. Ghosh, P., Ghosh, R., Dutta, R.: An alternative model of virtualization based intrusion detection system in cloud computing. Int. J. Sci. Technol. Res. 3, 199–203 (2014)

    Google Scholar 

  10. Kholidy, H.A., Baiardi, F.: CIDS: a framework for intrusion detection in cloud system. In: Ninth International Conference on Information Technology—New Generations, pp. 379–385. IEEE Computer Society (2012)

    Google Scholar 

  11. Al-Janabi, S.T.F., Saeed, H.A.: A neural network based anomaly intrusion detection system. In: IEEE Computer Society, pp. 221–226 (2011)

    Google Scholar 

  12. Mazzariello, C., Bifulco, R., Canonico, R.: Integrating a network IDS into an open source computing environment. In: Sixth International Conference on Information Assurance and Security (IAS), pp. 265–270. IEEE Publisher, Atlanta, GA (2010)

    Google Scholar 

  13. Bakshi, A., Yogesh, B.: Securing cloud from DDOS Attacks using Intrusion detection system in virtual machine. In: Second International Conference on Communication Software and Networks, IEEE Computer Society, pp. 260–264 (2010)

    Google Scholar 

  14. Ghali, N.I.: Feature selection for effective anomaly-based intrusion detection. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 9, 285–289 (2009)

    Google Scholar 

  15. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD Cup 99 data set. In: Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Application (CISDA). pp. 53–58. IEEE Publisher (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Partha Ghosh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Ghosh, P., Mandal, A.K., Kumar, R. (2015). An Efficient Cloud Network Intrusion Detection System. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2250-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2250-7_10

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2249-1

  • Online ISBN: 978-81-322-2250-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics