Designing a multi-layered security algorithms for network intrusion detection systems on virtual machines in the cloud computing

نویسندگان

  • Mohammad Rafiee
  • Majid Mohammadi
چکیده

With the emergence of new generation networks and providing new types of services, as cloud computing networks, the need to provide security that are compatible with the performance of these networks lead us to offer an algorithm for using the context of security available in prior networks. In this algorithm, intrusion detection systems(IDS) are activated depending on the service which selected by the user. The packages of each user is related to the network layer and standard protocols and will be selected considering that intrusion detection system. The techniques used in this paper are based on the parallel use of intrusion detection systems on network virtual machines. As objectives of this algorithm, we can point to reducing the computational load in contrast to large number of users and applications. Considering that internet is the context of using these networks, we need to reduce the response time to the user as short as possible.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

A Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems

Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, in addition to high operating costs and huge amounts of electrical power consumption. Insuffic...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613

Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denialof-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnera...

متن کامل

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-ofService (DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulner...

متن کامل

A Novel Intrusion Detection Using Decentralized Attack Analyzer and Network Controller in Virtual Network System

Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi step exploitation, low frequency vuln...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013