Abstract
Security in the cloud computing environment is very important in the detection of intrusions into the virtual network layer. Denial of service (DoS) and distributed denial of service (DDoS) attacks are the main threats to cloud computing, and it is therefore crucial to protect against these types of intrusive attack. In this chapter, the effective monitoring of security by a hybrid intrusion detection system (H-IDS) in the virtual network layer of cloud computing technology is discussed and a detailed view of insider and outsider attackers in the virtual network layer is provided. This framework splits into four layers, namely virtual machine layer, node layer, cloud cluster layer, and cloud layer. Signature and anomaly techniques are used to detect known as well as unknown attacks and all virtual machine (VM) host systems which are available in the cloud computing environment are considered. The cloud cluster layer uses a correlation module (CM) to detect distributed attacks, and the Dempster-Shafer theory (DST) is employed in the final decision-making phase of the intrusion detection system (IDS) in order to improve its accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Turab, N. M., Abu, A., & Shadi, T. (2013). Cloud computing challenges and solutions. International Journal of Computer Networks & Communications (IJCNC), 5(5), 209–216.
Lock, H.-Y. (2012). InfoSec reading room. Reading.
Raghav, I. (2013). Intrusion detection and prevention in cloud environment: A systematic review. International Journal of Computer Applications, 68(24), 7–11.
Mahalakshmi, B., & Suseendran, G. (2016, July). Effectuation of secure authorized deduplication in hybrid cloud. Indian Journal of Science and Technology, 9(25).
Amudhavel, J., et al. (2016). A survey on Intrusion Detection System: State of the art review. Indian Journal of Science and Technology, 9(11), 1–9.
Potteti, S., & Parati, N. (2015). Hybrid intrusion detection architecture for cloud environment. International Journal of Engineering and Computer Science, 4(5), 12146–12151.
Chou, T.-S. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science and Information Technology, 5(3), 79–88.
G. #132 Ismael Valenzuela—Global Director, and Foundstone Consulting Services. Targeted ransomware attacks in the cloud. [Online]. Available: https://files.sans.org/summit/healthcare2016/PDFs/Prediction-2017-I-Survived-a-Ransomware-Attack-in-my-Cloud-Ismael-Valenzuela.pdf. Accessed June 18, 2017.
Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014). If you want to know about a hunter, study his pray: Detection of network based attacks on KVM based cloud environments. Journal of Cloud Computing: Advances, Systems and Applications, 3(1), 20.
Kene, S. G., & Theng, D. P. (2015). A review on intrusion detection techniques for cloud computing and security challenges. In IEEE Sponsored 2nd International Conference on Electronics and Communication Systems (ICECS) (pp. 227–232).
Ansari, G. (2016). Framework for hybrid network intrusion detection and prevention system. Interational Journal of Computer Technology & Application, 7(August), 502–507.
Barabas, M., Homoliak, I., Drozd, M., & Hanacek, P. (2013). Automated malware detection based on novel network behavioral signatures. IACSIT International Journal of Engineering and Technology, 5(2).
Kumar, U. (2015). A survey on intrusion detection systems for cloud computing environment. International Journal of Computer Applications, 109(1), 6–15.
Le Dang, N., Le, D., & Le, V. T. (2016). A new multiple-pattern matching algorithm for the network intrusion detection system. IACSIT International Journal of Engineering and Technology, 8(2).
Puri, A., & Sharma, N. (2017). A novel technique for intrusion detection system for network security using hybrid SVM-cart. International Journal of Engineering Development and Research (IJEDR), 5(2), 155–161.
Vieira, K., Schulter, A., Westphall, C., & Westphall, C. M. (2010). Intrusion detection for grid and cloud computing. IT Professional Magazine, 12(4), 38–43.
Singh, D., Patel, D., Borisaniya, B., & Modi, C. (2016). Collaborative IDS framework for cloud. International Journal of Network Security, 18(4), 699–709.
Kamatchi, A., & Modi, C. N. (2016). An efficient security framework to detect intrusions at virtual network layer of cloud computing. In 19th International ICIN Conference-Innovations in Clouds, Internet and Network (pp. 133–140).
Thong, P. H., & Son, L. H. (2016). An overview of semi-supervised fuzzy clustering algorithms. IACSIT International Journal of Engineering and Technology, 8(4), 301–306.
Sondhi, J. (2014). A review of intrusion detection technique using various technique of machine learning and feature optimization technique. International Journal of Computer Applications, 93(14), 43–47.
Jeong, H. D. J., Hyun, W. S., Lim, J., & You, I. (2012). Anomaly teletraffic intrusion detection systems on Hadoop-based platforms: A survey of some problems and solutions. 2012 15th IEEE International Conference on Network-Based Information Systems (pp. 766–770), NBIS, September, 2012.
Jones, C. B., & Carter, C. (2017). Trusted interconnections between a centralized controller and commercial building HVAC systems for reliable demand response. IEEE Access, 5, 11063–11073.
Mann, A. S., & Kumar, V. (2016, November). An efficient method for estimation of cost in cloud computing using neural network. Indian Journal of Science and Technology, 9(44).
Singh, P., & Hazela, B. (2016). Design & Development of a new hybrid system to Prevent Intrusion at cloud using genetic algorithm. International Journal of Advance Research in Computer Science and Management Studies, 4(6).
De Vos, A. F. (2000). A primer in Bayesian Inference. Web ref: http://personal.vu.nl/a.f.de.vos/primer/primer.pdf
Phule, S. G., & Chavan, G. T. (2015). Intrusion response with Dempster Shafer theory of evidence to detect and overcome routing attack in Mobile Ad hoc Networks. International Research Journal of Engineering and Technology (IRJET), 2(2), 410–416.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nathiya, T., Suseendran, G. (2019). An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology. In: Balas, V., Sharma, N., Chakrabarti, A. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-1274-8_36
Download citation
DOI: https://doi.org/10.1007/978-981-13-1274-8_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1273-1
Online ISBN: 978-981-13-1274-8
eBook Packages: EngineeringEngineering (R0)