Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism

نویسندگان

  • Azuan Ahmad
  • Norbik Bashah Idris
  • Mohd Nazri Kama
چکیده

Cloud Computing Security is a new implementation of computer technology and opens a new research area and creates a lot of opportunity of exploration. One of the new implementation in Cloud is Intrusion Detection System (IDS).There are problems with the implementation of existing IDS approach in Cloud environment. Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requirements. In addition, maintenance of traditional IDS in Cloud Computing system requires expertise and consumes more time where not each Cloud user has. A decentralized traditional IDS approach where being implemented in current Cloud Computing infrastructure will make the IDS management become complicated. Each user's IDS will not be the same in term of type and configurations and each user may have outdated signatures. Inter VM's communication also become a big concern when we implementing Cloud Computing system where communication between Clouds are not monitored and controlled by the traditional IDS implementation. A specific IDS model for Cloud computing is required to solve these problems. In this paper, we develop a prototype of Cloud IDS inspired by Dendritic Cell mechanism. Keywords—cloud computing; information security; artificial immune system; intrusion detection; dendritic cell

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism

Cloud Computing Security is a new era of computer technology and opens a new research area and creates a lot of opportunity of exploration. One of the new implementation in Cloud is Intrusion Detection System (IDS).There are problems with existing IDS approach in Cloud environment. Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requireme...

متن کامل

The Designation of Bio-Inspired Intrusion Detection System Model in Cloud Computing Based on Machine Learning

The paper proposed a new model by applying bio-inspired theory into intrusion detection system in cloud computing. Dendritic Cell algorithm (DCA) based on Danger Theory get involved in the model designation in allusion to the existing problem, high false negative rate, low detection efficiency, low real-time process, and lack of adaptive of the unknown aggressive behavior for nowadays detection...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Adopting Dendritic Cell Algorithm to Conform a Hybrid Intrusion Detection System

Artificial immune system (AIS) is applied to hybrid intrusion detection system (IDS). A hybrid IDS is inspired by the concept of danger theory of human immune system is proposed in this paper and works for both host as well as network. The idea behind this hybrid IDS is based on the functionality of dendritic cells and the logs generated by the usage of host and network resources. The logs are ...

متن کامل

Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm

The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. However, it is not only important to utilize the HIS in producing AIS-based algorithms as much as it is important to introduce an algorithm with high performance. Therefore, c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016