2015
DOI: 10.1007/978-3-319-19210-9_13
|View full text |Cite
|
Sign up to set email alerts
|

cl-CIDPS: A Cloud Computing Based Cooperative Intrusion Detection and Prevention System Framework

Abstract: Abstract. Cloud Computing is one of today's most promising technologies due to its cost-efficiency, flexibility and scalability for computing processes. However, the complex architecture of cloud infrastructure and the different levels of users lead to special requirements especially in security area. The Cloud provider is responsible for providing secure, reliable and trustful services to its consumers. Network intrusion detection system and network intrusion prevention system (IDPS), is a pioneer active secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Also, a cloud-oriented accommodating ID and stoppage mechanism was presented by Al-Mousa and Nasir. 89 The system adds some contributions to the cloud by suggesting a unified scheme for spotting, stoppage, and logging abilities using signature and anomaly spotting systems. A simulator was used to evaluate and test the spotting units and communication diagrams.…”
Section: Hybrid Intrusion Detection Systems (Hids)mentioning
confidence: 99%
“…Also, a cloud-oriented accommodating ID and stoppage mechanism was presented by Al-Mousa and Nasir. 89 The system adds some contributions to the cloud by suggesting a unified scheme for spotting, stoppage, and logging abilities using signature and anomaly spotting systems. A simulator was used to evaluate and test the spotting units and communication diagrams.…”
Section: Hybrid Intrusion Detection Systems (Hids)mentioning
confidence: 99%
“…Security threats can be categorized as external attacks, theft related attacks, system malfunction, service interruption and human errors. The impact ratings and likelihood of high level threats are identified, analyzed and mitigated [21].The cloud oriented cooperative intrusion detection systems using signature mechanisms are used with Nessi2 as a simulator tool for cloud security [22]. Fuzzy Self organizing maps are used in past for improving the networking capabilities of cloud [23].System privacy risks are mitigated by a PIA(privacy assessment tool) which informs decision makers to decide how the project will proceed [24].One more methodology supports behavior engineering for model based process improvement and assessment in cloud computing.…”
Section: Risk Management Strategies In Cloud Computingmentioning
confidence: 99%
“…The proposed C-NIDS detects network intrusion in cloud environment, handle rigid traffic in cloud without packet loss/drop. In the paper authors [16] explained placement and integration of NIDS in various ways using front end ,back end and on virtual machine. It was detected that if we positioned and integrate NIDS on front end then network intrusion on external network will be easily identified and if NIDS is integrated on virtual machine then the user will detect intrusion on his own virtual machine very efficiently.…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…The proposed framework was integrated at each cluster and bully election algorithm is used to elect best cluster for integration of Collaborative Unit(CU). A decision tree classifier and SVM is used to improve detection accuracy and efficiency of cloud system and for detection of intruder [16]. A nonconventional method was proposed by authors [17] to secure cloud environment from malicious attackers with use of network profiling.…”
Section: Introduction and Related Workmentioning
confidence: 99%