An intrusion detection and prevention system in cloud computing: A systematic review

Journal of Network and Computer Applications - Tập 36 - Trang 25-41 - 2013
Ahmed Patel1,2, Mona Taghavi1, Kaveh Bakhtiyari1, Joaquim Celestino Júnior3
1School of Computer Science Centre of Software Technology and Management (SOFTAM), Faculty of Information Science and Technology (UKM), Universiti Kebangsaan Malaysia (UKM), 43600 UKM Bangi, Selangor Darul Ehsan, Malaysia
2Visiting Professor School of Computing and Information Systems, Faculty of Science, Engineering and Computing, Kingston University, Kingston upon Thames, KT1 2EE, United Kingdom
3Vieira Computer Networks and Security Laboratory (LARCES), State University of Ceará (UECE), Fortaleza, Ceará, Brazil

Tài liệu tham khảo

Al-Mamory, 2010, New data mining technique to enhance IDS alarms quality, Journal in Computer Virology, 6, 43, 10.1007/s11416-008-0104-2 Anuar, 2008, Identifying false alarm for network intrusion detection system using data mining and decision tree, Malaysian Journal of Computer Science, 21, 101, 10.22452/mjcs.vol21no2.3 Arshad, 2012, A novel intrusion severity analysis approach for Clouds, Future Generation Computer Systems Awodele, 2009, A multi-layered approach to the design of intelligent intrusion detection and prevention system (IIDPS), Issues in Informing Science and Information Technology, 6, 10.28945/1086 Axelsson, 2000 Azmandian, 2011, Virtual machine monitor-based lightweight intrusion detection, SIGOPS—Operating Systems Review, 45, 38, 10.1145/2007183.2007189 Beale J, AR Baker,B Caswell, and M Poor, “Snort 2.1 Intrusion Detection,” ed.: Syngress Media Inc, 2004, p. 25 Bringas, 2009, Next-generation misuse and anomaly prevention system, Enterprise Information Systems, 19, 117, 10.1007/978-3-642-00670-8_9 Bringas, 2009, 19, 117 Byrski, 2008, 5103, 584 Carl, 2006, Denial-of-service attack-detection techniques, Internet Computing, IEEE,, 10, 82, 10.1109/MIC.2006.5 Castillo, 2012 Chandola, 2009, Anomaly detection: a survey, ACM Computing Surveys, 41, 1, 10.1145/1541880.1541882 Chen, 2006, Mobile agent based wireless sensor networks, Journal of Computers, 1, 14, 10.4304/jcp.1.1.14-21 Choo, 2011, The cyber threat landscape: challenges and future research directions, Computers & Security, 30, 719, 10.1016/j.cose.2011.08.004 Chung-Ming, 2012, Host-based intrusion detection systems adapted from agent-based artificial immune systems, Neurocomputing Cloud-Security-Alliance. (2010). Top Threats to Cloud Computing V1.0. Available: 〈https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf〉 Dastjerdi AV, KA Bakar, and SGH Tabatabaei, “Distributed intrusion detection in clouds using mobile agents,” in Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema. pp. 175–180, 2009. Dhage S, B Meshram, R Rawat, S Padawe, M Paingaokar, and A Misra, “Intrusion detection system in cloud computing environment,” in International Conference & Workshop on Emerging Trends in Technology, New York, NY, USA pp. 235–9, 2011. Elshoush, 2011, Alert correlation in collaborative intelligent intrusion detection systems—a survey, Applied Soft Computing, 11, 4349, 10.1016/j.asoc.2010.12.004 Estevez-Tapiador, 2004, Anomaly detection methods in wired networks: a survey and taxonomy, Computer Communications, 27, 1569, 10.1016/j.comcom.2004.07.002 Foster I, Y Zhao, I Raicu, and S Lu, “Cloud computing and grid computing 360-degree compared,” in Grid Computing Environments Workshop, 2008. GCE ‘08 Austin, TX. pp. 1–10, 2008 Gaffney JEJr and JW Ulvila, “Evaluation of intrusion detectors: a decision theory approach,” in IEEE Symposium on Security and Privacy, 2001. S&P 2001, Oakland, CA, USA. pp. 50–61, 2001. Galante J., O Kharif, and P Alpeyev (2011, May 17, 2011). Sony Network Breach Shows Amazon Cloud's Appeal for Hackers. Available: 〈http://www.bloomberg.com/news/2011-05-15/sony-attack-shows-amazon-s-cloud-service-lures-hackers-at-pennies-an-hour.html〉 García-Teodoro, 2009, Anomaly-based network intrusion detection: techniques, systems and challenges, Computers & Security, 28, 18, 10.1016/j.cose.2008.08.003 Grobauer, 2011, Understanding cloud computing vulnerabilities, Security & Privacy, IEEE, 9, 50, 10.1109/MSP.2010.115 Gunasekaran S., “Comparison of network intrusion detection systems in cloud computing environment,” in international conference on computer communication and informatics (ICCCI), Coimbatore, pp. 1–6, 2012. Gustavo, 2011, Anomaly-based intrusion detection in software as a service, Dependable Systems and Networks Workshops, 19 Herrero, 2009, 4 204, 377 Hoang, 2009, A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference, Journal of Network and Computer Applications, 32, 1219, 10.1016/j.jnca.2009.05.004 Hwang, 2007, Hybrid intrusion detection with weighted signature generation over anomalous internet episodes, Dependable and Secure Computing, IEEE Transactions on, 4, 41, 10.1109/TDSC.2007.9 Jaiswal, 2010, Database intrusion prevention cum detection system with appropriate response, International Journal of Information Technology, 2, 651 Jin, 2011, A VMM-based intrusion prevention system in cloud computing environment, The Journal of Supercomputing, 1 Kazienko, 2004, Intrusion Detection Systems, Windowsecurity Kerschbaum, 2002, Using internal sensors and embedded detectors for intrusion detection, Journal of Computer Security, 10, 23, 10.3233/JCS-2002-101-203 Klüft S, Alarm management for intrusion detection systems—prioritizing and presenting alarms from intrusion detection systems,” Master, Computer Science Programme, master of science thesis, University of Gothenburg, 〈http://hdl.handle.net/2077/28856〉, 2012. Khanum, 2012, Mobile agent based hierarchical intrusion detection system in wireless sensor networks, International Journal of Computer Science Issues, IJCSI, 9 Kholidy HA and F. Baiardi, CIDS: a Framework for Intrusion Detection in Cloud Systems,” in Ninth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, pp. 379–5, 2012. Khorshed, 2012, A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing, Future Generation Computer Systems, 28, 833, 10.1016/j.future.2012.01.006 Kizza, 2009, System intrusion detection and prevention, 273 Lee JH, MW Park, JH Eom, and TM Chung, “Multi-level Intrusion Detection System and log management in Cloud Computing,” in 13th international conference on advanced communication technology (ICACT), Seoul, pp. 552–5, 2011. Lee JH, MW Park, JH Eom, and TM Chung, “Multi-level intrusion detection system and log management in cloud computing,” 13th international conference on advanced communication technology (ICACT), pp. 552–5, 2011. Leitner M, Leitner P, Zach M, Collins S, Fahy C, “Fault management based on peer-to-peer paradigms; a case study report from the celtic project madeira,” in 10th IFIP/IEEE International Symposium on Integrated Network Management, pp. 697–700, 2007. Liang, 2006, An immunity-based dynamic multilayer intrusion detection system, 4115, 641 Lippmann, 2002, The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection, 2516, 307 Li, 2010, 6328, 233 Li, 2010, An ontology-based intrusion alerts correlation system, Expert Systems with Applications, 37, 7138, 10.1016/j.eswa.2010.03.068 Maggi, 2009, Reducing false positives in anomaly detectors through fuzzy alert aggregation, Information Fusion, 10, 300, 10.1016/j.inffus.2009.01.004 Mansour, 2010, Filtering intrusion detection alarms, Cluster Computing, 13, 19, 10.1007/s10586-009-0096-9 Martínez CA , Echeverri GI, and Sanz AGC, “Malware detection based on cloud computing integrating intrusion ontology representation,” in IEEE Latin-American Conference on Communications (LATINCOM), Bogota, pp. 1–6, 2010. Masud, 2008, Cloud-based malware detection for evolving data streams, ACM Transactions Management Information Systems, 2, 1, 10.1145/2019618.2019622 Moore, 2008, The “Big Picture” of insider it sabotage across U.S. critical infrastructures, 39, 17 Nazer, 2011, Current intrusion detection techniques in information technology—a detailed analysis, European Journal of Scientific Research, 65, 611 Patcha, 2007, An overview of anomaly detection techniques: existing solutions and latest technological trends, Computer Networks, 51, 3448, 10.1016/j.comnet.2007.02.001 Patel A, Qassim Q, Shukor Z, Nogueira J, Júnior J, Wills C, “Autonomic agent-based self-managed intrusion detection and prevention system,” in South African information security multi-conference (SAISMC 2010), Port Elizabeth, South Africa, pp. 223–24, 2009. Patel, 2010, A survey of intrusion detection and prevention systems, Information Management and Computer Security, 18, 277, 10.1108/09685221011079199 Perdisci, 2006, Alarm clustering for intrusion detection systems in computer networks, Engineering Applications of Artificial Intelligence, 19, 429, 10.1016/j.engappai.2006.01.003 Pietraszek, 2005, Data mining and machine learning—towards reducing false positives in intrusion detection, Information Security Technical Report, 10, 169, 10.1016/j.istr.2005.07.001 Rasoulifard, 2009, Incremental hybrid intrusion detection using ensemble of weak classifiers, 6, 577 Roschke S, F Cheng, and C Meinel, “Intrusion detection in the Cloud,” presented at the Eighth IEEE international conference on dependable, autonomic and secure computing, pp. 729–34, 2009. Scarfone, 2007, Guide to Intrusion Detection and Prevention Systems (idps), 800 Schubert, 2010, The future for cloud computing: opportunities for european cloud computing beyond, Expert Group Report, Public Version1, European Commission 2010 Shabtai, 2010, Google android: a comprehensive security assessment, Secur. Privacy IEEE, 8, 35, 10.1109/MSP.2010.2 Sharma, 2011, Intrusion detection systems technology, International Journal of Engineering and Advanced Technology (IJEAT), 1, 28 Shon, 2006, Applying genetic algorithm for classifying anomalous TCP/IP packets, Neurocomputing, 69, 2429, 10.1016/j.neucom.2006.01.023 Shyu, 2009, A multiagent-based intrusion detection system with the support of multi-class supervised classification, 127 Smith, 2004, A smart sensor to detect the falls of the elderly, Pervasive Computing, IEEE, 3, 42, 10.1109/MPRV.2004.1316817 Smith D, Q Guan, and S Fu, “An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems,” 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), Seoul, pp. 376–1, 2010. Spathoulas, 2010, Reducing false positives in intrusion detection systems, Computers & Security, 29, 35, 10.1016/j.cose.2009.07.008 Sproull, 2007, Distributed instrusion prevention in active and extensible networks active networks, 3912, 54 Subashini, 2011, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, 1, 10.1016/j.jnca.2010.07.006 Su, 2009, A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach, Computers & Security, 28, 301, 10.1016/j.cose.2008.12.001 Sy, 2009, Integrating intrusion alert information to aid forensic explanation: an analytical intrusion detection framework for distributive IDS, Inf. Fusion, 10, 325, 10.1016/j.inffus.2009.01.001 Takahashi T, Y Kadobayashi, and H Fujiwara, “Ontological approach toward cybersecurity in cloud computing,” presented at the Proceedings of the 3rd international conference on Security of information and networks, Taganrog, Rostov-on-Don, Russian Federation, 2010. Thatte, 2011, Parametric methods for anomaly detection in aggregate traffic,, IEEE/ACM Transactions on Networking (TON), 19, 512, 10.1109/TNET.2010.2070845 Tjhai, 2010, A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm, Computers & Security, 29, 712, 10.1016/j.cose.2010.02.001 Topaloglu, 2008, Secure mobile agent execution in virtual environment, Autonomous Agents and Multi-Agent Systems, 16, 1, 10.1007/s10458-007-9018-5 Tupakula U, V Varadharajan, and N Akku, “Intrusion Detection Techniques for Infrastructure as a Service Cloud,” IEEE International Conference on Dependable, Autonomic and Secure Computing pp. 744–1, 2011. Viega, 2009, Cloud computing and the common man, Computer, 42, 106, 10.1109/MC.2009.252 Vieira, 2010, Ntrusion detection for grid and cloud computing, IT Professional, 12, 38, 10.1109/MITP.2009.89 Vincent Zhou, 2009, Decentralized multi-dimensional alert correlation for collaborative intrusion detection, Journal of Network and Computer Applications, 32, 1106, 10.1016/j.jnca.2009.02.010 Wang C, Q Wang, K Ren, and W Lou, “Ensuring data storage security in cloud computing,” in 17th International Workshop on Quality of Service, 2009. IWQoS, Charleston, SC. pp. 1–9, 2009 Whitman, 2011, Principles of Information Security, ed.: Course Technology Ptr, 315 Wu, 2010, The use of computational intelligence in intrusion detection systems: a review, Applied Soft Computing, 10, 1, 10.1016/j.asoc.2009.06.019 Xie, 2011, Anomaly detection in wireless sensor networks: a survey, Journal of Network and Computer Applications, 34, 1302, 10.1016/j.jnca.2011.03.004 Xin W, H Ting-lei, and L Xiao-yu, Research on the Intrusion detection mechanism based on cloud computing,” in 2010 International Conference on Intelligent Computing and Integrated Systems (ICISS), Guilin, pp. 125–8, 2010. Xu, 2008, Correlation analysis of intrusion alerts, 38 Yue, 2010, A cost-based analysis of intrusion detection system configuration under active or passive response, Decision Support System, 50, 21, 10.1016/j.dss.2010.06.001 Zargar ST, H Takabi, and JBD Joshi, “Dcdidp: a distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments,” in International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, Florida, 2011. Zeng, 2009, A new intrusion detection method based on antibody concentration emerging intelligent computing technology and applications, 5755, 500 Zhou, 2010, A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, 29, 124, 10.1016/j.cose.2009.06.008