Security of Cloud System by IDS-AM-Clust
(*) Corresponding author
DOI: https://doi.org/10.15866/irecos.v13i1.15644
Abstract
Cloud computing increases the expertise, scalability and efficiency of the company. However, new security issues arise. Indeed, traditional security solutions are becoming obsolete because the majority of the traffic of virtual networks does not necessarily leave the physical server ,and therefore does not allow permanent control. In order to overcome these limitations, this article presents the integration of a mobile agent-based intrusion detection system in a data-center to provide a security solution that detects known and unknown attacks in a cloud environment.
Copyright © 2018 Praise Worthy Prize - All rights reserved.
Keywords
Full Text:
PDFReferences
Muhammad Imran et al., Aggregated provenance and its implications in clouds, Research article Future Generation Computer Systems, Volume 81, April 2018,n Pages 348-358.
https://doi.org/10.1016/j.future.2017.10.027
Omar Achbarou et al., Cloud Security: A Multi Agent Approach Based Intrusion Detection System, Indian Journal of Science and Technology, Vol 10(18), May 2017.
doi: 10.17485/ijst/2017/v10i18/109044
Chaimae Saadi and Habiba Chaoui Proposed an approach to reduce the vulnerability in a cloud system, published in BDCA 2018. Communications in Computer and Information Science, vol 872. Springer, Cham. Online ISBN : 978-3-319-96292-4.
doi: https://doi.org/10.1007/978-3-319-96292-4_5
Preeti Mishra et al., Intrusion detection techniques in cloud environment: A survey, Review article Journal of Network and Computer Applications, Volume 77, 1 January 2017, Pages 18-47
R. Lua and K. C. Yow, Mitigating ddos attacks with transparent and intelligent fast-flux swarm network, Netw. IEEE, vol. 25, no. 4, pp. 28–33, 2017.
https://doi.org/10.1109/mnet.2011.5958005
Gaurav Somani et al., DDoS victim service containment to minimize the internal collateral damages in cloud computing, Computers & Electrical Engineering, Volume 59, April 2017, Pages 165-179.
https://doi.org/10.1016/j.compeleceng.2016.12.004
Sparsh Sharma, Ajay Kaul, Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET, Vehicular Communications, Volume 12,April 2018, Pages 23-38.
https://doi.org/10.1016/j.vehcom.2017.12.003
Mohamed Hawedi, Chamseddine Talhi, Hanifa Boucheneb, Security as a Service for Public Cloud Tenants(SaaS), Procedia Computer Science, Volume 130, 2018, Pages 1025-1030.
https://doi.org/10.1016/j.procs.2018.04.143
Sparsh Sharma, Ajay Kaul, A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud Vehicular Communications Volume 12, April 2018, Pages 138-164.
https://doi.org/10.1016/j.vehcom.2018.04.005
Mohammed Idhammada et al., Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques, The First International Conference On Intelligent Computing in Data Sciences Procedia Computer Science 127 (2018) 35–41.
https://doi.org/10.1016/j.procs.2018.01.095
Chaimae Saadi and Habiba Chaoui, A new approach to mitigate security threats in cloud environment, ICC '17 Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing Article No. 17 Cambridge, United Kingdom — March 22 - 23, 2017 ACM New York, NY, USA ©2017 ISBN: 978-1-4503-4774-7.
https://doi.org/10.1145/3018896.3018911
Gajare, S., Khan, R., Secure Cloud Based Storage System with De-Duplication and Compression, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (6), pp. 509-515.
https://doi.org/10.15866/irecap.v7i6.13352
Diovu, R., Agee, J., Smart Grid Advanced Metering Infrastructure: Overview of Cloud-Based Cyber Security Solutions, (2018) International Journal on Communications Antenna and Propagation (IRECAP), 8 (4), pp. 302-314,
https://doi.org/10.15866/irecap.v8i4.13394
Vitekar, A., Kota, P., A Survey on Evolution in Information Security, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (6), pp. 502-508.
https://doi.org/10.15866/irecap.v7i6.13347
Bruno L.Dalmazo João P.Vilela Marilia Curado, Triple-Similarity Mechanism for alarm management in the cloud, Computers & Security Volume 78, September 2018, Pages 33-42.
https://doi.org/10.1016/j.cose.2018.05.016
Saadi, C., Chaoui, H., Erguig, H., Contribution to Abnormality Detection by Use of Clust-Density Algorithm, (2015) International Review on Computers and Software (IRECOS), 10 (4), pp. 431-437.
https://doi.org/10.15866/irecos.v10i4.5699
Chaimae Saadi, Habiba Chaoui and Hassan Erguig, Security Analysis Using Ids Based On Mobile Agents And Data Mining Algorithms, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 6 (1), 597-602, 2015.
Chaimae Saadi and Habiba Chaoui, Intrusion Detection System based Interaction on Mobile Agents and Clust-density Algorithm “IDS-AM-Clust” in CiSt-IEEE INTERNATIONAL CONFERENCE SERIES Invited Session on Optimization and Modeling of Complex system of Systems CiSt (OMCS).
https://doi.org/10.1109/cist.2016.7804973
Franck LEON, La construction des Business Models des fournisseurs de services d’infrastructure Cloud Computing (IaaS), Thèse en vue de l’obtention du titre de Docteur en Sciences de Gestion Présentée et soutenue publiquement le 24 mars 2015.
Chaimae Saadi and Habiba Chaoui, Cloud Computing Security using IDS-AM-Clust, honeyd, Honeywall and honeycomb in Procedia Computing sciences CMS 2016.
https://doi.org/10.1016/j.procs.2016.05.189
Refbacks
- There are currently no refbacks.
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize