Cooperative Intrusion Detection System Framework Using Mobile Agents for Cloud Computing
نویسندگان
چکیده
Cloud computing improves collaboration, flexibility, scaling, and availability, and provides the potential for cost reduction through optimized and efficient computing. Cloud computing allows the use of a collection of services, applications, information, and infrastructure composed of group of compute, network, information, and storage resources. In brief, the Cloud Computing is undergoing an incontestable success, which could be indeed compromised by concerns about the risks related to potential misuse of this model aimed at conducting illegal activities. To address these problems, a framework of cooperative Hybrid intrusion detection system (Hy-IDS) and Mobile Agents is proposed. This framework allows protection against the intrusion attacks. Our Hybrid IDS is based on two types of IDS, the first for the detection of attacks at the level of virtual machines (VMs), the second for the network attack detection and Mobile Agents. After the collection of malicious data from infected sources (VMs) via the first category of IDS; the second category of IDS is also used for the generation of new signatures from the collected data based on a signature generation algorithm. However, these new signatures are used to update the database of the IDS itself. The mobile agents play an important role in this collaboration. They are used in our framework for investigation of Hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. With this technique, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. In this paper, the existing IDS and Mobile Agents technology are studied. Then we develop a collaborative approach based on Hy-IDS and Mobile Agents in Cloud Environment, to define a dynamic context which enables the detection of new attacks.
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملCooperative Trust Framework for Cloud Computing Based on Mobile Agents
Cloud computing opens doors to the multiple, unlimited venues from elastic computing to on demand provisioning to dynamic storage, reduce the potential costs through optimized and efficient computing. To provide secure and reliable services in cloud computing environment is an important issue. One of the security issues is how to reduce the impact of any type of intrusion in this environment. T...
متن کاملCloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb ¬リニ
The cloud computing security has become a basic necessity. It acquires knowledge about vulnerabilities, attacks, activities of attackers and tools to secure it. This work proposes new cloud infrastructure architecture, which combines IDS based on mobile agent sand using three types of honeypots in order to detect attacks, to study the behavior of attackers, increase the added value of Honeypot ...
متن کاملIntrusion detection techniques for mobile cloud computing in heterogeneous 5G
Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system (IDS) is an efficient approach for protecting wireless communications in the Fifth Genera...
متن کاملReal-Time Building Information Modeling (BIM) Synchronization Using Radio Frequency Identification Technology and Cloud Computing System
The online observation of a construction site and processes bears significant advantage to all business sector. BIM is the combination of a 3D model of the project and a project-planning program which improves the project planning model by up to 6D (Adding Time, Cost and Material Information dimensions to the model). RFID technology is an appropriate information synchronization tool between the...
متن کامل