Open Access Open Access  Restricted Access Subscription or Fee Access

Security of Cloud System by IDS-AM-Clust


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v13i1.15644

Abstract


Cloud computing increases the expertise, scalability and efficiency of the company. However, new security issues arise. Indeed, traditional security solutions are becoming obsolete because the majority of the traffic of virtual networks does not necessarily leave the physical server ,and therefore does not allow permanent control. In order to overcome these limitations, this article presents the integration of a mobile agent-based intrusion detection system in a data-center to provide a security solution that detects known and unknown attacks in a cloud environment.
Copyright © 2018 Praise Worthy Prize - All rights reserved.

Keywords


Cloud; IDS; Attacks; Mobile Agent; IAAS

Full Text:

PDF


References


Muhammad Imran et al., Aggregated provenance and its implications in clouds, Research article Future Generation Computer Systems, Volume 81, April 2018,n Pages 348-358.
https://doi.org/10.1016/j.future.2017.10.027

Omar Achbarou et al., Cloud Security: A Multi Agent Approach Based Intrusion Detection System, Indian Journal of Science and Technology, Vol 10(18), May 2017.

doi: 10.17485/ijst/2017/v10i18/109044

Chaimae Saadi and Habiba Chaoui Proposed an approach to reduce the vulnerability in a cloud system, published in BDCA 2018. Communications in Computer and Information Science, vol 872. Springer, Cham. Online ISBN : 978-3-319-96292-4.

doi: https://doi.org/10.1007/978-3-319-96292-4_5

Preeti Mishra et al., Intrusion detection techniques in cloud environment: A survey, Review article Journal of Network and Computer Applications, Volume 77, 1 January 2017, Pages 18-47

R. Lua and K. C. Yow, Mitigating ddos attacks with transparent and intelligent fast-flux swarm network, Netw. IEEE, vol. 25, no. 4, pp. 28–33, 2017.
https://doi.org/10.1109/mnet.2011.5958005

Gaurav Somani et al., DDoS victim service containment to minimize the internal collateral damages in cloud computing, Computers & Electrical Engineering, Volume 59, April 2017, Pages 165-179.
https://doi.org/10.1016/j.compeleceng.2016.12.004

Sparsh Sharma, Ajay Kaul, Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET, Vehicular Communications, Volume 12,April 2018, Pages 23-38.
https://doi.org/10.1016/j.vehcom.2017.12.003

Mohamed Hawedi, Chamseddine Talhi, Hanifa Boucheneb, Security as a Service for Public Cloud Tenants(SaaS), Procedia Computer Science, Volume 130, 2018, Pages 1025-1030.
https://doi.org/10.1016/j.procs.2018.04.143

Sparsh Sharma, Ajay Kaul, A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud Vehicular Communications Volume 12, April 2018, Pages 138-164.
https://doi.org/10.1016/j.vehcom.2018.04.005

Mohammed Idhammada et al., Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques, The First International Conference On Intelligent Computing in Data Sciences Procedia Computer Science 127 (2018) 35–41.
https://doi.org/10.1016/j.procs.2018.01.095

Chaimae Saadi and Habiba Chaoui, A new approach to mitigate security threats in cloud environment, ICC '17 Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing Article No. 17 Cambridge, United Kingdom — March 22 - 23, 2017 ACM New York, NY, USA ©2017 ISBN: 978-1-4503-4774-7.
https://doi.org/10.1145/3018896.3018911

Gajare, S., Khan, R., Secure Cloud Based Storage System with De-Duplication and Compression, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (6), pp. 509-515.
https://doi.org/10.15866/irecap.v7i6.13352

Diovu, R., Agee, J., Smart Grid Advanced Metering Infrastructure: Overview of Cloud-Based Cyber Security Solutions, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (4), pp. 302-314,
https://doi.org/10.15866/irecap.v8i4.13394

Vitekar, A., Kota, P., A Survey on Evolution in Information Security, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (6), pp. 502-508.
https://doi.org/10.15866/irecap.v7i6.13347

Bruno L.Dalmazo João P.Vilela Marilia Curado, Triple-Similarity Mechanism for alarm management in the cloud, Computers & Security Volume 78, September 2018, Pages 33-42.
https://doi.org/10.1016/j.cose.2018.05.016

Saadi, C., Chaoui, H., Erguig, H., Contribution to Abnormality Detection by Use of Clust-Density Algorithm, (2015) International Review on Computers and Software (IRECOS), 10 (4), pp. 431-437.
https://doi.org/10.15866/irecos.v10i4.5699

Chaimae Saadi, Habiba Chaoui and Hassan Erguig, Security Analysis Using Ids Based On Mobile Agents And Data Mining Algorithms, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 6 (1), 597-602, 2015.

Chaimae Saadi and Habiba Chaoui, Intrusion Detection System based Interaction on Mobile Agents and Clust-density Algorithm “IDS-AM-Clust” in CiSt-IEEE INTERNATIONAL CONFERENCE SERIES Invited Session on Optimization and Modeling of Complex system of Systems CiSt (OMCS).
https://doi.org/10.1109/cist.2016.7804973

Franck LEON, La construction des Business Models des fournisseurs de services d’infrastructure Cloud Computing (IaaS), Thèse en vue de l’obtention du titre de Docteur en Sciences de Gestion Présentée et soutenue publiquement le 24 mars 2015.

Chaimae Saadi and Habiba Chaoui, Cloud Computing Security using IDS-AM-Clust, honeyd, Honeywall and honeycomb in Procedia Computing sciences CMS 2016.
https://doi.org/10.1016/j.procs.2016.05.189


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize