Security in Cloud Computing using IDS with Map Reduce Framework and Virtualization CSci 530 Computer Security Systems

نویسندگان

  • AMAN BAKSHI
  • Aman Bakshi
چکیده

Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction [6]. It is a promising hosting for services, applications, information and infrastructure comprising of geographically distributed resources. However, with these advantages we are also storing a large amount of critical information which attracts the hackers. To prevent such attacks, Intrusion detection systems (IDS) have been used previously which are built manually. The drawback is that it finds difficult to classify intruders and thus requires an overhead of computation. Artificial intelligence (AI) has been used for anomaly detection, data reduction and induction, i.e. discovery of new rules to explain the data. [4] IDS when incorporated along with AI for feedback can be used to create more robust real time IDS. With the popularity of cloud computing, these IDS log files are also increasing rapidly, the effect is limited and inefficient by using the conventional analysis system. Proposed idea also employs Hadoop's MapReduce algorithm analysis of IDS files for real time analysis. This paper discusses about cloud computing focusing more on its security aspects. It surveys various technologies implemented and proposed for securing the data on the cloud in the past. Lastly, I propose a mechanism to combine this technologies to secure cloud from attacks, an intelligent cloud.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A review of methods for resource allocation and operational framework in cloud computing

The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...

متن کامل

VM Consolidation by using Selection and Placement of VMs in Cloud Datacenters

The Cloud Computing model leverages virtualization of computing resources allowing customers to provision resources on-demand on a pay-as-you-go basis. During recent years, the power consumption of datacenters in cloud environment attracted researchers. Optimization of energy consumption can be performed by different methods including virtual machine (VM) consolidation. This technique can reduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013