Advertisement

Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 216)

Abstract

Security requires user authentication with password digital certificates and confidentiality for transmission of data in a distributed system. The Intrusion Detection System (IDS) detect intrusions by means of knowledge and behavior analysis. In this paper, we introduce concept called cloud computing to increase data efficiency and satisfies user request. We also include grid computing to make cloud computing more efficient, reliable, and increase the performance of the systems that are accessing server. This is because of more user logins at the same time and the server is not able to provide equal performance to all other system. We can achieve performance by getting performance from the system that are connected to server and providing it to system that accessing the server.

Keywords

Cloud computing Grid computing Data efficiency Data security Intrusion detection system Knowledge analysis Behavior analysis 

References

  1. 1.
    Chaboya, D.J., Raines, R.A., Baldwin, R.O., Mullins, B.E.: Network intrusion detection: automated and manual method prone to attack and evaton. IEEE Secur. Priv. 4, 36–43 (2006)Google Scholar
  2. 2.
    Overill, R.E.: Intrusion detection systems: threats, taxonomy, tuning. J. Finan. Crim. 6, 49–51 (1998)Google Scholar
  3. 3.
    Smarr, L., Catlett, C.E.: Meta computing. Commun. ACM 35, 44–52 (1992)Google Scholar
  4. 4.
    Schulter, A.: Intrusion detection for computational grids. Proceedings of 2nd International 2nd Conference on new technologies, mobility, and security, Tangier - Morocco, pp. 1–5. IEEE Press, (2008) Google Scholar
  5. 5.
    Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a serverless distributed file 284 system deployed on an existing set of desktop PCs, SIGMETRICS, ACM, Performance Evaluation 285 Review, 34–43 (2000). http://dl.acm.org/citation.cfm?doid=339331.339345
  6. 6.
    Idris, N.B., Shanmugam, B.: Indicon. Annual IEEE, pp. 52–55, 2005. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1590122&punumber%3D10601
  7. 7.
    Cuppens, F., Gombault, S.: Thierry Sans: selecting appropriate counter-measures in an intrusion detection framework. In: Proceedings of the 17th IEEE workshop on computer security foundations, pp. 78–80, 2004. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1310733&sortType%3Dasc_p_Sequence%26filter%3DAND%28p_IS_Number%3A29101%29
  8. 8.
    Zhang, G.Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. ACM J. Wirel. Netw. 9, 545–546 (2003)CrossRefGoogle Scholar
  9. 9.
    Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222–232 (1987)Google Scholar
  10. 10.
    Li, T., Song, M., Alam, M.: Compromized sensor node detection: a quantitative approach. In: Proceedings of the IEEE international conference on distributed computing systems, pp. 352–357, 2008.Google Scholar
  11. 11.
    Shapiro, M.: Structure and encapsulation in distributed systems: the proxy principle, Proc. 6th Int. Conf. on Distributed Computing Systems(ICDCS), Cambridge MA (USA), pp. 198–204, 1986 Google Scholar
  12. 12.
    Lunt, Teresa F.: “IDES: An intelligent system for detecting intruders,” Proceedings of the symposium on computer security; threats, and counter measures; Rome, Italy, pp. 110–121, 22–23 Nov 1990 Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.School of Computing SciencesHindustan UniversityChennaiIndia

Personalised recommendations